Story image

Researchers dissect 10-year-old Snowball malware

08 Sep 17

The creators behind malware toolkit known as ‘Animal Farm’ may have been using one of its implants since at least 2007, and researchers happened on the discovery by chance.

The Animal Farm toolkit is made up of several implants called Bunny, NBot, Dino, Casper, Tafaclou and Babar/SNOWBALL.

While previous samples of Snowball malware dated back to 2011, researchers at Palo Alto Networks’ Unit 42 have discovered a sample with a timestamp of September 2007. Researchers only spotted the malware after scouring a repository for an unrelated malware.

“This earlier sample of Babar uses many features not present in later versions. The sample also uses a compromised third party website as a C2 server like later versions. We also found a simple bug and a design flaw in the code you wouldn’t expect from malware developed by mature actors,” comments researcher Dominik Reichel.

The sample, a portable executable, takes the form of a loader. Inside the loader is the payload. The malware attempts to obtain debug privileges and attempts to detect if the operating system is Windows Vista.  

If successful, the malware then insert event logs and attempts to gain access to the AppData folder path.

“The malware also tries to delete any traces it was executed by deleting the corresponding entries in the registry keys,” Reichel says.

After checking everything is functioning correctly, the malware then tries to access the default internet browser. These seem to work with Firefox and Internet Explorer, but not with Chrome.

Reichel says that Chrome was released in 2008, after the original malware was created. Therefore, it cannot be a bug.

A compromised website was used as a command & control server. In this case, it was the official site of the Permanent council of Accounting of the Democratic Republic of the Congo, however the attack was carried out so long ago the script behind the website is not online anymore.

After a number of tests, the malware can then conduct a number of commands. Those commands can shut down and reboot systems, download files, get lists and types of partitions, report a victim’s system information, terminate and delete itself, and change a range of characteristics via XML.

“This malware has a small set of features ranging from retrieving system information, to downloading files or killing processes on a victim’s system. Technically, it is not outstanding and can be considered only average compared to alleged state sponsored malware written at that time (e.g. Careto or Regin). The code and structure is similar to the Casper implant which is most likely based on this implant. The malware contains an obvious design flaw leaving the main part of the configuration data visible in clear text,” Reichel concludes.

Symantec releases neural network-integrated USB scanning station
Symantec Industrial Control System Protection Neural helps defend against USB-borne cyber attacks on operational technology.
SingleSource scores R&D grant to explore digital identity over blockchain
Callaghan Innovation has awarded a $318,000 R&D grant to Auckland-based firm SingleSource, a company that applies risk scoring to digital identity.
Ramping up security with next-gen firewalls
The classic firewall lacked the ability to distinguish between different kinds of web traffic.
Spark Lab launches free cybersecurity tool for SMBs
Spark Lab has launched a new tool that it hopes will help New Zealand’s small businesses understand their cybersecurity risks.
Gartner names LogRhythm leader in SIEM solutions
Security teams increasingly need end-to-end SIEM solutions with native options for host- and network-level monitoring.
Cylance makes APIs available in endpoint detection offering
Extensive APIs enable security teams to more efficiently view, enrich, and contextualise real-time intelligence collected at the endpoint to keep systems secure.
SolarWinds adds SDN monitoring support to network management portfolio
SolarWinds announced a broad refresh to its network management portfolio, as well as key enhancements to the Orion Platform. 
JASK prepares for global rollout of their AI-powered ASOC platform
The JASK ASOC platform automates alert investigations, supposedly freeing the SOC analyst to do what machines can’t.