SlideShare una empresa de Scribd logo
1 de 39
Descargar para leer sin conexión
Reversing banking trojan: an in-depth look
              into Gataka


               Jean-Ian Boutin
                   ESET
Outline

• Background
• Architecture
  • Overview of plugins
• Network Protocol
• Webinject
• Campaigns
Background
Origins

• Aliases: Tatanga, Hermes
• First publicly discussed in 2011 by S21Sec
• Targets mostly European users
What is it?

• Banking trojan
   • Designed to steal all kind of sensitive information through Man-
     In-The-Browser scheme
   • Regionalized
   • Not very wide spread
• Developped in C++
• Modular architecture similar to SpyEye
• Very verbose, a lot of debug information are sent to Command and
  Control Server.
• Frequent update with new plugins and plugin versions.
• Several advanced features
Geographic distribution of detection
Business model

• This is not a do-it-yourself kit like
   SpyEye
• It seems that this kit is private or sold
   only to selected groups
• Infection vector
    • BlackHole
    • Malicious attachment
Basics
DEMO1
Installation


• Infection vector
    • BlackHole
    • Malicious attachment
• Installation
    • Injection in all processes
• Communications done through IE
Persistence
Architecture
Modular Architecture




• HermesCore
    • Communicate with C&C
    • Ability to launch downloaded
      executable
DEMO2
Interceptor
Interceptor

• Supported browsers
    • Firefox
    • Internet Explorer
    • Opera
    • Maxthon
• Frequent update to
  support latest browser
  versions
Communication can now be monitored




• NextGenFixer
    • Install filters on particular
      URLs
• Webinject
    • Inject html/javascript
    • Record videos/screenshots
• HttpTrafficLogger
    • Log selected communications
      to/from specific websites
• CoreDb
    • Stores information received
      from C&C
DEMO3
IEXPLORE – certificate patching
Network Protocol
Topology




Compromised hosts   Proxy servers   C&C
Packet Decomposition



                 TCP/IP Header
Packet 1
                 Gataka Header

                 Encrypted Data

                       …
Packet n
                 Gataka Header

                 Encrypted Data
C++ Reversing

• Some basic suff
   • This pointer usually passed in ecx
   • In object, vtable is at first offset
DEMO4
Gataka header
                             0-7            8-15          16-23            24-31
                                               Magic Number
                       NW Protocol                      Byte mask


• When packets are     Use xor key                        dword1
  received from C&C,                                      dword2
  dword9 is optional                                     Data size
  and Bot Id is absent
                                                  Uncompressed Data Size
                                                         XOR key
                                                          dword6
                                                          dword7
                                                        checksum
                                                          dword9
                                                     Bot Id (64 bytes)
Send packet - log
Plugins Storage
Webinject
CoreDb
Webinject
Self-contained webinject

Webinject contained in DB




Webinject downloaded from
external server
                                                       Injected content
Webinject – Gataka platform communications
DEMO5
Campaigns
Germany – statistics from one campaign


                                                        0,17%
                                            1,51% 0,25%       0,05%        Total Hits: 248,468


• These statistics were obtained
  from a C&C
    • Almost 75% of                25,10%
                                                                                  Germany
                                                                                  Unresolved/Unknown
      compromised hosts in
                                                                                  United States
      Germany
                                                                                  Israel
                                                                                  Sweden
                                                                                  Canada


                                                                  72,92%
Germany – Two factor authentication bypass




                                         Image sources: wikipedia.org and postbank.de
Netherlands
Conclusion
Thank You!
Questions ?

Más contenido relacionado

Similar a Reversing banking trojan: an in-depth look into Gataka

What the HEC? Security implications of HDMI Ethernet Channel and other relate...
What the HEC? Security implications of HDMI Ethernet Channel and other relate...What the HEC? Security implications of HDMI Ethernet Channel and other relate...
What the HEC? Security implications of HDMI Ethernet Channel and other relate...44CON
 
Secure Application Development in the Age of Continuous Delivery
Secure Application Development in the Age of Continuous DeliverySecure Application Development in the Age of Continuous Delivery
Secure Application Development in the Age of Continuous DeliveryTim Mackey
 
Secure Application Development in the Age of Continuous Delivery
Secure Application Development in the Age of Continuous DeliverySecure Application Development in the Age of Continuous Delivery
Secure Application Development in the Age of Continuous DeliveryBlack Duck by Synopsys
 
Building a Secure App with Docker - Ying Li and David Lawrence, Docker
Building a Secure App with Docker - Ying Li and David Lawrence, DockerBuilding a Secure App with Docker - Ying Li and David Lawrence, Docker
Building a Secure App with Docker - Ying Li and David Lawrence, DockerDocker, Inc.
 
Modern Post-Exploitation Strategies - 44CON 2012
Modern Post-Exploitation Strategies - 44CON 2012Modern Post-Exploitation Strategies - 44CON 2012
Modern Post-Exploitation Strategies - 44CON 201244CON
 
Security research over Windows #defcon china
Security research over Windows #defcon chinaSecurity research over Windows #defcon china
Security research over Windows #defcon chinaPeter Hlavaty
 
[CB20] Reverse Engineering archeology : Reverse engineering multiple devices ...
[CB20] Reverse Engineering archeology : Reverse engineering multiple devices ...[CB20] Reverse Engineering archeology : Reverse engineering multiple devices ...
[CB20] Reverse Engineering archeology : Reverse engineering multiple devices ...CODE BLUE
 
Vulnerability Inheritance in ICS (English)
Vulnerability Inheritance in ICS (English)Vulnerability Inheritance in ICS (English)
Vulnerability Inheritance in ICS (English)Digital Bond
 
Mitigate potential compliance risks
Mitigate potential compliance risksMitigate potential compliance risks
Mitigate potential compliance risksJürgen Brüder
 
Technical Workshop - Win32/Georbot Analysis
Technical Workshop - Win32/Georbot AnalysisTechnical Workshop - Win32/Georbot Analysis
Technical Workshop - Win32/Georbot AnalysisPositive Hack Days
 
Securing your Cloud Environment
Securing your Cloud EnvironmentSecuring your Cloud Environment
Securing your Cloud EnvironmentShapeBlue
 
DEF CON 27 - ORANGE TSAI and MEH CHANG - infiltrating corporate intranet like...
DEF CON 27 - ORANGE TSAI and MEH CHANG - infiltrating corporate intranet like...DEF CON 27 - ORANGE TSAI and MEH CHANG - infiltrating corporate intranet like...
DEF CON 27 - ORANGE TSAI and MEH CHANG - infiltrating corporate intranet like...Felipe Prado
 
Advanced Internet of Things firmware engineering with Thingsquare and Contiki...
Advanced Internet of Things firmware engineering with Thingsquare and Contiki...Advanced Internet of Things firmware engineering with Thingsquare and Contiki...
Advanced Internet of Things firmware engineering with Thingsquare and Contiki...Adam Dunkels
 
Rainbow Over the Windows: More Colors Than You Could Expect
Rainbow Over the Windows: More Colors Than You Could ExpectRainbow Over the Windows: More Colors Than You Could Expect
Rainbow Over the Windows: More Colors Than You Could ExpectPeter Hlavaty
 
Discovering Vulnerabilities For Fun and Profit
Discovering Vulnerabilities For Fun and ProfitDiscovering Vulnerabilities For Fun and Profit
Discovering Vulnerabilities For Fun and ProfitAbhisek Datta
 
Thick Application Penetration Testing - A Crash Course
Thick Application Penetration Testing - A Crash CourseThick Application Penetration Testing - A Crash Course
Thick Application Penetration Testing - A Crash CourseNetSPI
 
Typhoon Managed Execution Toolkit
Typhoon Managed Execution ToolkitTyphoon Managed Execution Toolkit
Typhoon Managed Execution ToolkitDimitry Snezhkov
 
RSA SF Conference talk-2009-ht2-401 sallam
RSA SF Conference talk-2009-ht2-401 sallamRSA SF Conference talk-2009-ht2-401 sallam
RSA SF Conference talk-2009-ht2-401 sallamAhmed Sallam
 

Similar a Reversing banking trojan: an in-depth look into Gataka (20)

What the HEC? Security implications of HDMI Ethernet Channel and other relate...
What the HEC? Security implications of HDMI Ethernet Channel and other relate...What the HEC? Security implications of HDMI Ethernet Channel and other relate...
What the HEC? Security implications of HDMI Ethernet Channel and other relate...
 
Secure Application Development in the Age of Continuous Delivery
Secure Application Development in the Age of Continuous DeliverySecure Application Development in the Age of Continuous Delivery
Secure Application Development in the Age of Continuous Delivery
 
Secure Application Development in the Age of Continuous Delivery
Secure Application Development in the Age of Continuous DeliverySecure Application Development in the Age of Continuous Delivery
Secure Application Development in the Age of Continuous Delivery
 
Building a Secure App with Docker - Ying Li and David Lawrence, Docker
Building a Secure App with Docker - Ying Li and David Lawrence, DockerBuilding a Secure App with Docker - Ying Li and David Lawrence, Docker
Building a Secure App with Docker - Ying Li and David Lawrence, Docker
 
Modern Post-Exploitation Strategies - 44CON 2012
Modern Post-Exploitation Strategies - 44CON 2012Modern Post-Exploitation Strategies - 44CON 2012
Modern Post-Exploitation Strategies - 44CON 2012
 
Security research over Windows #defcon china
Security research over Windows #defcon chinaSecurity research over Windows #defcon china
Security research over Windows #defcon china
 
[CB20] Reverse Engineering archeology : Reverse engineering multiple devices ...
[CB20] Reverse Engineering archeology : Reverse engineering multiple devices ...[CB20] Reverse Engineering archeology : Reverse engineering multiple devices ...
[CB20] Reverse Engineering archeology : Reverse engineering multiple devices ...
 
Vulnerability Inheritance in ICS (English)
Vulnerability Inheritance in ICS (English)Vulnerability Inheritance in ICS (English)
Vulnerability Inheritance in ICS (English)
 
Mitigate potential compliance risks
Mitigate potential compliance risksMitigate potential compliance risks
Mitigate potential compliance risks
 
Iot in-production
Iot in-productionIot in-production
Iot in-production
 
Technical Workshop - Win32/Georbot Analysis
Technical Workshop - Win32/Georbot AnalysisTechnical Workshop - Win32/Georbot Analysis
Technical Workshop - Win32/Georbot Analysis
 
Securing your Cloud Environment
Securing your Cloud EnvironmentSecuring your Cloud Environment
Securing your Cloud Environment
 
DEF CON 27 - ORANGE TSAI and MEH CHANG - infiltrating corporate intranet like...
DEF CON 27 - ORANGE TSAI and MEH CHANG - infiltrating corporate intranet like...DEF CON 27 - ORANGE TSAI and MEH CHANG - infiltrating corporate intranet like...
DEF CON 27 - ORANGE TSAI and MEH CHANG - infiltrating corporate intranet like...
 
Advanced Internet of Things firmware engineering with Thingsquare and Contiki...
Advanced Internet of Things firmware engineering with Thingsquare and Contiki...Advanced Internet of Things firmware engineering with Thingsquare and Contiki...
Advanced Internet of Things firmware engineering with Thingsquare and Contiki...
 
Rainbow Over the Windows: More Colors Than You Could Expect
Rainbow Over the Windows: More Colors Than You Could ExpectRainbow Over the Windows: More Colors Than You Could Expect
Rainbow Over the Windows: More Colors Than You Could Expect
 
Discovering Vulnerabilities For Fun and Profit
Discovering Vulnerabilities For Fun and ProfitDiscovering Vulnerabilities For Fun and Profit
Discovering Vulnerabilities For Fun and Profit
 
Docker Introduction
Docker IntroductionDocker Introduction
Docker Introduction
 
Thick Application Penetration Testing - A Crash Course
Thick Application Penetration Testing - A Crash CourseThick Application Penetration Testing - A Crash Course
Thick Application Penetration Testing - A Crash Course
 
Typhoon Managed Execution Toolkit
Typhoon Managed Execution ToolkitTyphoon Managed Execution Toolkit
Typhoon Managed Execution Toolkit
 
RSA SF Conference talk-2009-ht2-401 sallam
RSA SF Conference talk-2009-ht2-401 sallamRSA SF Conference talk-2009-ht2-401 sallam
RSA SF Conference talk-2009-ht2-401 sallam
 

Reversing banking trojan: an in-depth look into Gataka