Fortinet Blog | News and Threat Research

  • Products
  • Solutions
  • Service & Support
  • Partners
  • Corporate
  • Resources
  • Try & Buy
  • All
  • Security Research
  • Security 101
  • Industry Trends
  • Behind the Firewall
  • Q and A
RSSSubscribe to All Posts

6.25 DNS DDOS Attack In Korea

by RSS Kyle Yang  |  July 14, 2013  |  Category: Security Research

Shortly after 10:00am Jun 25th 2013, many government websites from South Korea were not accessible. It was actually caused by the malware performing ddos attack on 2 major DNS servers (ns.gcc.go.kr and ns2.gcc.go.kr).


Original Attack Vector


During the investigation, we managed to find the original attack sample which was served by a compromised website at that time (simdisk.co.kr).

The downloaded file named SimDisk_setup.exe turned out to be a self-extracting RAR file. 6 25 DNS DDOS Attack In Korea 1

In this SFX RAR file were sitting 2 files: 6 25 DNS DDOS Attack In Korea 2


Simdiskup.exe file


SimDiskup.exe (created on 2013-06-24) is the malicious file. It downloads other malicious files from a remote website. 6 25 DNS DDOS Attack In Korea 3

For instance it tried to download c.jpg from the website above. 6 25 DNS DDOS Attack In Korea 4

Actually c.jpg is obviously an executable, saved as ~simdisk.exe and run after successfully downloaded.


~simdisk.exe (c.jpg)


Upon execution, it will drop 3 files, 2 of them (explorer.exe and config.ini) turning out to be the TOR system version 0.2.3.25. The third file, alg.exe, is yet another downloader. 6 25 DNS DDOS Attack In Korea 5

alg.exe will then use the tor network to download yet another file, which is the final DDoS payload. It will try to connect to the following tor onions (onions are hidden, untraceable websites available only via Tor nodes):

  • http://hfc4z2pxfdmsfczp.onion/etc/
  • http://n3fwfxcdjfv4zxpa.onion/etc/
  • http://p4dxzhnlukvh6p4a.onion/etc/
  • http://swe4ta6k64m7vguk.onion/etc/
  • http://7odyldjmpzjrhsye.onion/etc/
  • http://vtyee6ev7gki7qxf.onion/etc/
  • http://rns3d52wyctfktcb.onion/etc/
  • http://et53n5fxxmjukgki.onion/etc/
  • http://u6irlnorfxnn7cqs.onion/etc/
  • http://snij5xfzt2qspxj2.onion/etc/

The interesting thing here is, the files mentioned above are all packed with the infamous run-time packer called Themida. But the final payload, downloaded by alg.exe, is not.


Final Step


First, it will check for a FileMapping Object 6 25 DNS DDOS Attack In Korea 6

Does this remind us of the 3.20 disk wipe-out attack?

After that, it will check for the OS architecture, 32bit or 64bit. In the case of a 32bit OS, it will drop ~DR[random number].tmp file from the resource section. After loading the ~DR tmp file, it will load another DLL file as a service. (It will do the same in 64bit OS).

After the service starts, it will check for the FileMapping Object: 6 25 DNS DDOS Attack In Korea 7

After resolving the API address, it will create a thread to start the communication. 6 25 DNS DDOS Attack In Korea 8

The response data is split in 2 parts:

1.) BM6W -> The only command which is hardcoded in the binary 6 25 DNS DDOS Attack In Korea 9

If the response data is anything other than BM6W, it will sleep, then try again.

2.) - 06 19 0a 00 - 0x06 - Month - 0x19 - Day - 0x0a - hour - 0x00 - minute

Looks like a time-bomb. Does this also remind us the 3.20 disk wipe-out attack?

If the system time has passed 6-25 10:00, it will drop another file which is packed by Themida as well. The filename is seen below: 6 25 DNS DDOS Attack In Korea 10


_
DDoS Payload


It will start 2 threads to perform the Ddos attack by querying [random string].gcc.go.kr: 6 25 DNS DDOS Attack In Korea 11

The 2 Ddos targets are hardcoded in the binary. 6 25 DNS DDOS Attack In Korea 12

6 25 DNS DDOS Attack In Korea 13

  • Ns.gcc.go.kr - 152.99.1.10
  • Ns2.gcc.go.kr - 152.99.200.6

In a nutshell the attack scenario flow can be represented as follows:

simdisk.co.kr → serves SimDisk_setup.exe → ** extracts to **SimDiskup.exe → downloads c.jpg → saved as ~simdisk.exe → drops alg.exe (plus Tor) → gets time of attack from hidden websites and drops wuauieop.exe → queries DNS for [random string].gcc.go.kr

Kyle Yang

CCIE#19065, Director of AV Engine Development. Leader of RAP and MVR Team.
My Latest Posts
  • Evolving History of Havex Module Downloader
  • Dissecting Latest Kelihos Peer Exchange Communication
  • 6.25 DNS DDOS Attack In Korea
by RSS Kyle Yang  |  July 14, 2013  |  Category: Security Research
Tags: ddos DNS south Korea distributed denial of service attack research simdisk_setup.exe simdisk korea hack
comments powered by Disqus

FortiGuard Labs on the Web

  • Twitter Twitter
  • Facebook Facebook
  • LinkedIn LinkedIn
  • Youtube Youtube

Monthly Archives

  • December 2014 5
  • November 2014 18
  • October 2014 16
  • September 2014 11
  • August 2014 11
  • July 2014 20
  • June 2014 21
  • May 2014 20
  • April 2014 16
  • March 2014 20
  • February 2014 15
  • January 2014 25
  • December 2013 10
  • November 2013 15
  • October 2013 19
  • September 2013 19
  • August 2013 14
  • July 2013 14
  • June 2013 2
  • April 2013 1
  • March 2013 12
  • February 2013 11
  • January 2013 12
  • December 2012 8
  • November 2012 7
  • October 2012 4
  • September 2012 6
  • August 2012 7
  • July 2012 62
  • June 2012 17
  • May 2012 14
  • April 2012 15
  • March 2012 14
  • February 2012 11
  • January 2012 6
  • December 2011 4
  • November 2011 6
  • October 2011 11
  • September 2011 2
  • August 2011 2
  • July 2011 4
  • June 2011 6
  • May 2011 6
  • April 2011 5
  • March 2011 7
  • February 2011 5
  • January 2011 7
  • December 2010 8
  • November 2010 11
  • October 2010 3
  • September 2010 8
  • August 2010 4
  • July 2010 9
  • June 2010 9
  • May 2010 9
  • April 2010 6
  • March 2010 8
  • February 2010 6
  • January 2010 9
  • December 2009 8
  • November 2009 6
  • October 2009 6
  • September 2009 8
  • August 2009 5
  • July 2009 8
  • June 2009 7
  • May 2009 4
  • April 2009 7
  • March 2009 9
  • February 2009 4
  • January 2009 1
  • Older