Story image

Researchers dissect 10-year-old Snowball malware

08 Sep 2017

The creators behind malware toolkit known as ‘Animal Farm’ may have been using one of its implants since at least 2007, and researchers happened on the discovery by chance.

The Animal Farm toolkit is made up of several implants called Bunny, NBot, Dino, Casper, Tafaclou and Babar/SNOWBALL.

While previous samples of Snowball malware dated back to 2011, researchers at Palo Alto Networks’ Unit 42 have discovered a sample with a timestamp of September 2007. Researchers only spotted the malware after scouring a repository for an unrelated malware.

“This earlier sample of Babar uses many features not present in later versions. The sample also uses a compromised third party website as a C2 server like later versions. We also found a simple bug and a design flaw in the code you wouldn’t expect from malware developed by mature actors,” comments researcher Dominik Reichel.

The sample, a portable executable, takes the form of a loader. Inside the loader is the payload. The malware attempts to obtain debug privileges and attempts to detect if the operating system is Windows Vista.  

If successful, the malware then insert event logs and attempts to gain access to the AppData folder path.

“The malware also tries to delete any traces it was executed by deleting the corresponding entries in the registry keys,” Reichel says.

After checking everything is functioning correctly, the malware then tries to access the default internet browser. These seem to work with Firefox and Internet Explorer, but not with Chrome.

Reichel says that Chrome was released in 2008, after the original malware was created. Therefore, it cannot be a bug.

A compromised website was used as a command & control server. In this case, it was the official site of the Permanent council of Accounting of the Democratic Republic of the Congo, however the attack was carried out so long ago the script behind the website is not online anymore.

After a number of tests, the malware can then conduct a number of commands. Those commands can shut down and reboot systems, download files, get lists and types of partitions, report a victim’s system information, terminate and delete itself, and change a range of characteristics via XML.

“This malware has a small set of features ranging from retrieving system information, to downloading files or killing processes on a victim’s system. Technically, it is not outstanding and can be considered only average compared to alleged state sponsored malware written at that time (e.g. Careto or Regin). The code and structure is similar to the Casper implant which is most likely based on this implant. The malware contains an obvious design flaw leaving the main part of the configuration data visible in clear text,” Reichel concludes.

New threat rears its head in new malware report
Check Point’s researchers view Speakup as a significant threat, as it can be used to download and spread any malware.
Oracle updates enterprise blockchain platform
Oracle’s enterprise blockchain has been updated to include more capabilities to enhance development, integration, and deployment of customers’ new blockchain applications.
Used device market held back by lack of data security regulations
Mobile device users are sceptical about trading in their old device because they are concerned that data on those devices may be accessed or compromised after they hand it over.
Gartner names ExtraHop leader in network performance monitoring
ExtraHop provides enterprise cyber analytics that deliver security and performance from the inside out.
Symantec acquires zero trust innovator Luminate Security
Luminate’s Secure Access Cloud is supposedly natively constructed for a cloud-oriented, perimeter-less world.
Palo Alto releases new, feature-rich firewall
Palo Alto is calling it the ‘fastest-ever next-generation firewall’ with integrated cloud-based DNS Security service to stop attacks.
The right to be forgotten online could soon be forgotten
Despite bolstering free speech and access to information, the internet can be a double-edged sword, because that access to information goes both ways.
Opinion: 4 Ransomware trends to watch in 2019
Recorded Future's Allan Liska looks at the past big ransomware attacks thus far to predict what's coming this year.