Re: Intrusec 55808 Trojan Analysis

From: Philippe Bourgeois (Philippe.Bourgeois@cert-ist.com)
Date: Fri Jun 27 2003 - 05:44:54 PDT

  • Next message: ZSisic: "possible new irc worm"

    There is a couple of things that look strange to me with that new trojan
    
    #1: how does the 55808 agent collect SYN/ACK replies ?
    
    > However, since the trojan also sniffs the network it is on in
    > promiscuous mode, it is likely, over time, to pick up scans from other
    > installations of trojans that randomly selected a source address that
    > happened to be on its subnet.
    
    After a quick look in "TCP Illustrated", it appears that :
    If I send a TCP-SYN with a window size set to 55808, the SYN+ACK reply will
    not have the window size set to 55808 (the window size will be choosen by
    the server to match its internal buffers size).
    
    It means that the 55808 trojan has to collect all the SYN+ACK packets it
    sees, and has no way to know if that packet is a reply to a 55808 SYN probe
    ...
    How can that work ?
    
    #2: how to propage a "command" to all the agents
    
    > The trojan appears to contain some functionality to change the IP
    > address it delivers its packet captures to, but this functionality is
    > not operational in the trojan we have obtained.  It appears the stubbed
    > out code, if activated, would function as follows:  If a packet is
    > captured that contains a window size of 55808 and a TCP option window
    > scale of 2, the trojan modifies the IP address packet captures are
    > delivered to based on the sequence number of that packet.
    
    To spread the "change the IP address" command you have to send packet
    "all-around" the internet.
    How does that work ? Does each agent forward the command to a "random" IP
    destination ? How to avoid 55808 storms (case where an agent captures the
    packet it just put on the wire to forward a command) ...
    
    Philippe Bourgeois
    Cert-IST - www.cert-ist.com
    
    > -----Message d'origine-----
    > De : incidents-return-5898-buginc=cert-ist.comat_private
    > [mailto:incidents-return-5898-buginc=cert-ist.comat_private]De
    > la part de David J. Meltzer
    > Envoyé : vendredi 20 juin 2003 12:59
    > À : bugtraqat_private; incidentsat_private
    > Objet : Intrusec 55808 Trojan Analysis
    >
    >
    > Intrusec Alert: 55808 Trojan Analysis
    >
    > Initial Release: 6/19/03 4:30PM EDT
    > Latest Update: 6/19/03 11:13PM EDT
    >
    > - Corrected analysis regarding use of sequence numbers to change IP
    > address.
    > - Added reference to alternate name "Stumbler" given to trojan by
    > Internet Security Systems subsequent to the release of Intrusec's
    > analysis.
    >
    >
    > Introduction:
    >
    > Intrusec has completed an initial analysis of a trojan that appears to
    > be one of several that is responsible for generating substantial
    > scanning traffic across the Internet with a TCP window size of 55808.
    > The trojan we have isolated appears to match many of the characteristics
    > that others in the security community have reported for this trojan.
    > However, we do not believe that the specific trojan we have identified
    > is the sole source of the traffic generated, and do not know that it is
    > a primary source.
    [...]
    
    
    ----------------------------------------------------------------------------
    Attend the Black Hat Briefings & Training, July 28 - 31 in Las Vegas, the 
    world's premier technical IT security event! 10 tracks, 15 training sessions, 
    1,800 delegates from 30 nations including all of the top experts, from CSO's to 
    "underground" security specialists.  See for yourself what the buzz is about!  
    Early-bird registration ends July 3.  This event will sell out. www.blackhat.com
    ----------------------------------------------------------------------------
    



    This archive was generated by hypermail 2b30 : Fri Jun 27 2003 - 20:36:04 PDT