WanaCryptor. NSA Exploits & Ransomware = Ransomworm.





By now i am sure you have all heard about the WanaCryptor ransomworm. What you may not know however is that there was a very specific exploit used in combination with this ransomware/worm. So for some background, a while ago NSA offshoot EQUATIONGROUP was hacked by a group of people calling themselves "the Shadow Brokers". It was claimed a large arsenal of 0days and custom exploits were taken in the data breach. This later turned out to be true when the Shadow Brokers dumped all the tools they had online. One of the vulnerabilities disclosed by the leak was one called MS17-010. Which is a critical vulnerability in the way Windows handles the Server Message Block implementation or SMB. SMB is a file transfer protocol. The flaw here is the way in which SMB handles specially crafted requests. With the right request this can allow for remote code execution and it is in this way that the Ransomware acts as a worm as well. Once an initial foothold is gained the ransomware scans the local network for the SMB service. If found it will it will launch an exploit to propagate over the network and infect as many machines as possible. If you're interested BAE Systems has a detailed analysis report On the malwares functionality. In the mean time Rapid7 has added a module for the exploit dubbed EternalBlue to the metasploit framework. The details for which can be found by clicking here. Interestingly enough as you can read in the BAE Systems article, the malware had some sort of kill switch functionality. What it does is check for the existence of a certain domain, if the domain is found it stops the execution of the payload. This is most likely done as a sandbox evasion technique. Ironically, once researchers found this out they were quick to register the domain which resulted in a drop in infections. The interesting thing about this ransomware attack is that it used a nation-state level exploit to act as a worm and that contrary to the usual delivery mechanism(Phishing campaign) it would appear SMB services faving the internet were directly targeted by the malware. Furthermore, Microsoft has come out with a patch. You are advised to update if you run Windows as OS on any boxes you have. If you'd like to know if your Windows is vulnerable you can use this Python script to find out.
Code: #!/usr/bin/python # -*- coding: utf-8 -*- # # References: # # https://blogs.technet.microsoft.com/msrc/2017/04/14/protecting-customers-and-evaluating-risk/ # https://www.rapid7.com/db/modules/auxiliary/scanner/smb/smb_ms17_010 # https://github.com/rapid7/metasploit-framework/blob/master/modules/auxiliary/scanner/smb/smb_ms17_010.rb # https://www.symantec.com/security_response/vulnerability.jsp?bid=96707 # https://winprotocoldoc.blob.core.windows.net/productionwindowsarchives/MS-SMB2/[MS-SMB2]-151016.pdf # https://msdn.microsoft.com/en-us/library/windows/desktop/aa365233(v=vs.85).aspx # https://technet.microsoft.com/en-us/library/security/ms17-010.aspx # https://community.rapid7.com/community/metasploit/blog/2017/04/03/introducing-rubysmb-the-protocol-library-nobody-else-wanted-to-write # https://msdn.microsoft.com/en-us/library/ee441741.aspx # https://github.com/countercept/doublepulsar-detection-script/blob/master/detect_doublepulsar_smb.py # http://stackoverflow.com/questions/38735421/packing-an-integer-number-to-3-bytes-in-python # https://zerosum0x0.blogspot.com/2017/04/doublepulsar-initial-smb-backdoor-ring.html """ $ python2.7 smb_exploit.py 192.168.206.152 [+] [192.168.206.152] is likely VULNERABLE to MS17-010! (Windows 7 Ultimate 7600) $ python2.7 smb_exploit.py 192.168.206.130 [+] [192.168.206.130] is likely VULNERABLE to MS17-010! (Windows 5.1) """ from ctypes import * import socket import struct import logging logging.basicConfig(level=logging.INFO, format="%(message)s") log = logging.getLogger(__file__) # negotiate_proto_request # session_setup_andx_request # tree_connect_andx_request # peeknamedpipe_request # trans2 request class SMB_HEADER(Structure): """SMB Header decoder. """ _pack_ = 1 # Alignment _fields_ = [ ("server_component", c_uint32), ("smb_command", c_uint8), ("error_class", c_uint8), ("reserved1", c_uint8), ("error_code", c_uint16), ("flags", c_uint8), ("flags2", c_uint16), ("process_id_high", c_uint16), ("signature", c_uint64), ("reserved2", c_uint16), ("tree_id", c_uint16), ("process_id", c_uint16), ("user_id", c_uint16), ("multiplex_id", c_uint16) ] def __new__(self, buffer=None): return self.from_buffer_copy(buffer) def __init__(self, buffer): log.debug("server_component : %04x" % self.server_component) log.debug("smb_command : %01x" % self.smb_command) log.debug("error_class : %01x" % self.error_class) log.debug("error_code : %02x" % self.error_code) log.debug("flags : %01x" % self.flags) log.debug("flags2 : %02x" % self.flags2) log.debug("process_id_high : %02x" % self.process_id_high) log.debug("signature : %08x" % self.signature) log.debug("reserved2 : %02x" % self.reserved2) log.debug("tree_id : %02x" % self.tree_id) log.debug("process_id : %02x" % self.process_id) log.debug("user_id : %02x" % self.user_id) log.debug("multiplex_id : %02x" % self.multiplex_id) def generate_smb_proto_payload(*protos): """Generate SMB Protocol. Pakcet protos in order. """ hexdata = [] for proto in protos: hexdata.extend(proto) return "".join(hexdata) def calculate_doublepulsar_xor_key(s): """Calaculate Doublepulsar Xor Key """ x = (2 * s ^ (((s & 0xff00 | (s << 16)) << 8) | (((s >> 16) | s & 0xff0000) >> 8))) x = x & 0xffffffff # this line was added just to truncate to 32 bits return x def negotiate_proto_request(): """Generate a negotiate_proto_request packet. """ log.debug("generate negotiate request") netbios = [ '\x00', # 'Message_Type' '\x00\x00\x54' # 'Length' ] smb_header = [ '\xFF\x53\x4D\x42', # 'server_component': .SMB '\x72', # 'smb_command': Negotiate Protocol '\x00\x00\x00\x00', # 'nt_status' '\x18', # 'flags' '\x01\x28', # 'flags2' '\x00\x00', # 'process_id_high' '\x00\x00\x00\x00\x00\x00\x00\x00', # 'signature' '\x00\x00', # 'reserved' '\x00\x00', # 'tree_id' '\x2F\x4B', # 'process_id' '\x00\x00', # 'user_id' '\xC5\x5E' # 'multiplex_id' ] negotiate_proto_request = [ '\x00', # 'word_count' '\x31\x00', # 'byte_count' # Requested Dialects '\x02', # 'dialet_buffer_format' '\x4C\x41\x4E\x4D\x41\x4E\x31\x2E\x30\x00', # 'dialet_name': LANMAN1.0 '\x02', # 'dialet_buffer_format' '\x4C\x4D\x31\x2E\x32\x58\x30\x30\x32\x00', # 'dialet_name': LM1.2X002 '\x02', # 'dialet_buffer_format' '\x4E\x54\x20\x4C\x41\x4E\x4D\x41\x4E\x20\x31\x2E\x30\x00', # 'dialet_name3': NT LANMAN 1.0 '\x02', # 'dialet_buffer_format' '\x4E\x54\x20\x4C\x4D\x20\x30\x2E\x31\x32\x00' # 'dialet_name4': NT LM 0.12 ] return generate_smb_proto_payload(netbios, smb_header, negotiate_proto_request) def session_setup_andx_request(): """Generate session setuo andx request. """ log.debug("generate session setup andx request") netbios = [ '\x00', # 'Message_Type' '\x00\x00\x63' # 'Length' ] smb_header = [ '\xFF\x53\x4D\x42', # 'server_component': .SMB '\x73', # 'smb_command': Session Setup AndX '\x00\x00\x00\x00', # 'nt_status' '\x18', # 'flags' '\x01\x20', # 'flags2' '\x00\x00', # 'process_id_high' '\x00\x00\x00\x00\x00\x00\x00\x00', # 'signature' '\x00\x00', # 'reserved' '\x00\x00', # 'tree_id' '\x2F\x4B', # 'process_id' '\x00\x00', # 'user_id' '\xC5\x5E' # 'multiplex_id' ] session_setup_andx_request = [ '\x0D', # Word Count '\xFF', # AndXCommand: No further command '\x00', # Reserved '\x00\x00', # AndXOffset '\xDF\xFF', # Max Buffer '\x02\x00', # Max Mpx Count '\x01\x00', # VC Number '\x00\x00\x00\x00', # Session Key '\x00\x00', # ANSI Password Length '\x00\x00', # Unicode Password Length '\x00\x00\x00\x00', # Reserved '\x40\x00\x00\x00', # Capabilities '\x26\x00', # Byte Count '\x00', # Account '\x2e\x00', # Primary Domain '\x57\x69\x6e\x64\x6f\x77\x73\x20\x32\x30\x30\x30\x20\x32\x31\x39\x35\x00', # Native OS: Windows 2000 2195 '\x57\x69\x6e\x64\x6f\x77\x73\x20\x32\x30\x30\x30\x20\x35\x2e\x30\x00', # Native OS: Windows 2000 5.0 ] return generate_smb_proto_payload(netbios, smb_header, session_setup_andx_request) def tree_connect_andx_request(ip, userid): """Generate tree connect andx request. """ log.debug("generate tree connect andx request") netbios = [ '\x00', # 'Message_Type' '\x00\x00\x47' # 'Length' ] smb_header = [ '\xFF\x53\x4D\x42', # 'server_component': .SMB '\x75', # 'smb_command': Tree Connect AndX '\x00\x00\x00\x00', # 'nt_status' '\x18', # 'flags' '\x01\x20', # 'flags2' '\x00\x00', # 'process_id_high' '\x00\x00\x00\x00\x00\x00\x00\x00', # 'signature' '\x00\x00', # 'reserved' '\x00\x00', # 'tree_id' '\x2F\x4B', # 'process_id' userid, # 'user_id' '\xC5\x5E' # 'multiplex_id' ] ipc = "\\\\{}\IPC$\x00".format(ip) log.debug("Connecting to {} with UID = {}".format(ipc, userid)) tree_connect_andx_request = [ '\x04', # Word Count '\xFF', # AndXCommand: No further commands '\x00', # Reserved '\x00\x00', # AndXOffset '\x00\x00', # Flags '\x01\x00', # Password Length '\x1C\x00', # Byte Count '\x00', # Password ipc.encode(), # \\xxx.xxx.xxx.xxx\IPC$ '\x3f\x3f\x3f\x3f\x3f\x00' # Service ] length = len("".join(smb_header)) + len("".join(tree_connect_andx_request)) # netbios[1] = '\x00' + struct.pack('>H', length) netbios[1] = struct.pack(">L", length)[-3:] return generate_smb_proto_payload(netbios, smb_header, tree_connect_andx_request) def peeknamedpipe_request(treeid, processid, userid, multiplex_id): """Generate tran2 request """ log.debug("generate peeknamedpipe request") netbios = [ '\x00', # 'Message_Type' '\x00\x00\x4a' # 'Length' ] smb_header = [ '\xFF\x53\x4D\x42', # 'server_component': .SMB '\x25', # 'smb_command': Trans2 '\x00\x00\x00\x00', # 'nt_status' '\x18', # 'flags' '\x01\x28', # 'flags2' '\x00\x00', # 'process_id_high' '\x00\x00\x00\x00\x00\x00\x00\x00', # 'signature' '\x00\x00', # 'reserved' treeid, processid, userid, multiplex_id ] tran_request = [ '\x10', # Word Count '\x00\x00', # Total Parameter Count '\x00\x00', # Total Data Count '\xff\xff', # Max Parameter Count '\xff\xff', # Max Data Count '\x00', # Max Setup Count '\x00', # Reserved '\x00\x00', # Flags '\x00\x00\x00\x00', # Timeout: Return immediately '\x00\x00', # Reversed '\x00\x00', # Parameter Count '\x4a\x00', # Parameter Offset '\x00\x00', # Data Count '\x4a\x00', # Data Offset '\x02', # Setup Count '\x00', # Reversed '\x23\x00', # SMB Pipe Protocol: Function: PeekNamedPipe (0x0023) '\x00\x00', # SMB Pipe Protocol: FID '\x07\x00', '\x5c\x50\x49\x50\x45\x5c\x00' # \PIPE\ ] return generate_smb_proto_payload(netbios, smb_header, tran_request) def trans2_request(treeid, processid, userid, multiplex_id): """Generate trans2 request. """ log.debug("generate tran2 request") netbios = [ '\x00', # 'Message_Type' '\x00\x00\x4f' # 'Length' ] smb_header = [ '\xFF\x53\x4D\x42', # 'server_component': .SMB '\x32', # 'smb_command': Trans2 '\x00\x00\x00\x00', # 'nt_status' '\x18', # 'flags' '\x07\xc0', # 'flags2' '\x00\x00', # 'process_id_high' '\x00\x00\x00\x00\x00\x00\x00\x00', # 'signature' '\x00\x00', # 'reserved' treeid, processid, userid, multiplex_id ] trans2_request = [ '\x0f', # Word Count '\x0c\x00', # Total Parameter Count '\x00\x00', # Total Data Count '\x01\x00', # Max Parameter Count '\x00\x00', # Max Data Count '\x00', # Max Setup Count '\x00', # Reserved '\x00\x00', # Flags '\xa6\xd9\xa4\x00', # Timeout: 3 hours, 3.622 seconds '\x00\x00', # Reversed '\x0c\x00', # Parameter Count '\x42\x00', # Parameter Offset '\x00\x00', # Data Count '\x4e\x00', # Data Offset '\x01', # Setup Count '\x00', # Reserved '\x0e\x00', # subcommand: SESSION_SETUP '\x00\x00', # Byte Count '\x0c\x00' + '\x00' * 12 ] return generate_smb_proto_payload(netbios, smb_header, trans2_request) def check(ip, port=445): """Check if MS17_010 SMB Vulnerability exists. """ try: buffersize = 1024 timeout = 5.0 # Send smb request based on socket. client = socket.socket(socket.AF_INET, socket.SOCK_STREAM) client.settimeout(timeout) client.connect((ip, port)) # SMB - Negotiate Protocol Request raw_proto = negotiate_proto_request() client.send(raw_proto) tcp_response = client.recv(buffersize) # SMB - Session Setup AndX Request raw_proto = session_setup_andx_request() client.send(raw_proto) tcp_response = client.recv(buffersize) netbios = tcp_response[:4] smb_header = tcp_response[4:36] # SMB Header: 32 bytes smb = SMB_HEADER(smb_header) user_id = struct.pack('".format(sys.argv[0])) sys.exit(1) else: check(sys.argv[1])
The credits for which of course go to the original author. I would link you directly to a Github account but a lot of people have independently uploaded the same code so i don't know who exactly the original author is. In conclusion, if you are looking for samples of WanaCryptor, below i have linked all samples as they are known to me. source:http://ytxmrc3pcbv5464e.onion

Komentar

Postingan Populer