Quantcast
Channel: Symantec Connect - Products - Articles
Viewing all articles
Browse latest Browse all 818

Support Perspective: TheShadowBrokers and Equation Tools

$
0
0

In April 2017, an attack group calling itself the TheShadowBrokers, released a trove of data it claims to have stolen from the Equation cyberespionage group. The data contains a range of exploits and tools the attack group state were used by Equation. TheShadowBrokers said that the data dump was a sample of what had been stolen from hacking Equation and that the “best” files would be auctioned off to the highest bidder.

The Equation group has been known for some time and uses highly advanced malware tools to target organizations in a range of countries. The group is technically competent and well resourced, using highly developed malware tools that go to great lengths to evade detection.
Shadows Brokers has released this data in a series of dumps. 

Symantec Security response often has coverage for these vulnerbilties and tools well in advance of disclosure, but in an effort to make the coverage more readable these are renamed to represent the events they are assoiciated with.

Lost In Translation
On April 14, 2017 TheShadowBrokers released a collection of files, containing exploits and hacking tools targeting Microsoft Windows.
Later that week Microsoft published a blog stating that most of the exploits that were disclosed in this dump fall into vulnerabilities that are already patched in their supported products.

Exploit NameCVETargeted ServiceIPS Signature NameAV Signature NameAV Signature Date
ETERNALROMANCE-1.3.0CVE-2017-0144Microsoft Windows SMBv1 Service

Sig ID: 30010 (OS Attack: Microsoft Windows SMB RCE CVE-2017-0144)
Sig ID: 21179 (OS Attack: Microsoft Windows SMB Remote Code Execution 3)
Sig ID: 23737 (Attack: Shellcode Download Activity)
Sig ID: 22534 (System Infected: Malicious Payload Activity 9)
Sig ID: 23862 (OS Attack: Microsoft Windows SMB Remote Code Execution)
Sig ID: 23875 (OS Attack: Microsoft SMB MS17-010 Disclosure Attempt)

Hacktool20170414.021
ETERNALROMANCE-1.4.0CVE-2017-0145Microsoft Windows SMBv1 Service

Sig ID: 21179 (OS Attack: Microsoft Windows SMB Remote Code Execution 3)
Sig ID: 23737 (Attack: Shellcode Download Activity)
Sig ID: 22534 (System Infected: Malicious Payload Activity 9)
Sig ID: 23862 (OS Attack: Microsoft Windows SMB Remote Code Execution
Sig ID: 23875 (OS Attack: Microsoft SMB MS17-010 Disclosure Attempt

Hacktool20170414.021
ENTERNALSYNERGYCVE-2017-0714Microsoft Windows SMBv3 ServiceSig ID: 30018 OS Attack: MSRPC Remote Management Interface BindHacktool20170414.021
ETERNALBLUECVE-2017-0143 Microsoft Windows SMBv1 ServiceSig ID: 21179 (OS Attack: Microsoft Windows SMB Remote Code Execution 3) 
Sig ID: 22534 (System Infected: Malicious Payload Activity 9)
Sig ID: 23737 (Attack: Shellcode Download Activity) 
Sig ID: 23862 (OS Attack: Microsoft Windows SMB Remote Code Execution)
Sig ID: 23875 (OS Attack: Microsoft SMB MS17-010 Disclosure Attempt)
Hacktool20170414.021
ETERNALCHAMPIONCVE-2017-0146
CVE-2017-0147
CVE-2017-0148
Microsoft Windows SMBv1 Service

Sig ID: 23624 (OS Attack: Microsoft Windows SMB Remote Code Execution 2) 
Sig ID: 21179 (OS Attack: Microsoft Windows SMB Remote Code Execution 3) 
Sig ID: 22534 (System Infected: Malicious Payload Activity 9) 
Sig ID: 23737 (Attack: Shellcode Download Activity)
Sig ID: 23862 (OS Attack: Microsoft Windows SMB Remote Code Execution)
Sig ID: 23875 (OS Attack: Microsoft SMB MS17-010 Disclosure Attempt)

Hacktool 20170414.021
ECLIPSEDWINGCVE-2008-4250Micorosft Windows Server ServiceSig ID: 23179 (OS Attack: MSRPC Server Service RPC CVE-2008-4250)
Sig ID: 23180 (OS Attack: MSRPC Server Service RPC CVE-2008-4250 2)
Hacktool20170414.020
EDUCATEDSCHOLARCVE-2009-2526Microsoft Windows SMBv2 ServiceSig ID: 23497 (OS Attack: MS SMB2 Validate Provider Callback CVE-2009-3103) Hacktool20170414.020
EMERALDTHREADCVE-2010-2729Microsoft Windows Print ServiceSig ID: 23897  (Attack: Windows Spooler Service CVE-2010-2729)Hacktool20170414.020
ESKIMOROLLCVE-2014-6324Microsoft Windows Kerberos KDCNo Signature AvailableHacktool20170414.021
EASYBEECVE-2007-1675MdaemonSig ID: 30015 (Attack: MDaemon WorldClient Attack)Hacktool20170414.020
ENGLISHMANDENTISTCVE-2009-0099
based on SID
Microsoft Outlook Exchange Web AccessSig ID: 30014 (Attack: MS Exchange Server RCE)Hacktool20170414.020
EXPLODINGCANCVE-2017-7269 Microsoft Windows
Server WebDav
Service 
Sig ID: 29071  (Web Attack: IIS Server CVE-2017-7269)Hacktool20170414.021
EMPHASISMINE-3.4.0CVE-2017-1274 IBM DominoNo Signature AvailableHacktool20170414.020
EWOKFRENZY-2.0.0CVE-2007-1675 IBM DominoSig ID: 21710 HTTP MDaemon IMAP Server Auth BO (not available in SEP only DCS)Hacktool20170414.021

Dont Forget Your Base
On April 8th a missive from the TheShadowBrokers also contained another large batch of files. These are mostly characterised as tools and scripts as opposed to the vulnerbilties as seen in the Lost in translation dump. Additionally items like scripts are easily customizable and altered to impact different targets and to avoid static detection.

All coverage information is based on available virus definitions from June 20, 2017

Tools
AV coverage
CHARMHAMMER Hacktool.Equation
CHARMPENGUINHacktool.Equation
CHARMRAZORHacktool.Equation
CONSTANTMOVENot Malicious
CRYPTTOOLNot Malicious
CURSEBINGOHacktool.Equation
CURSEBONGOHacktool.Equation
CURSECHICKENHacktool.Equation
CURSECLASHHacktool.Equation
CURSEDEVOHacktool.Equation
CURSEFIREHacktool.Equation
CURSEFLOWERHacktool.Equation
CURSEGISMOHacktool.Equation
CURSEHAPPYHacktool.Equation
CURSEHELPERHacktool.Equation
CURSEHOLEHacktool.Equation
CURSEHUMMERHacktool.Equation
CURSEHYDRANTHacktool.Equation
CURSEJOKERHacktool.Equation
CURSEKETTLEHacktool.Equation
CURSEKILNHacktool.Equation
CURSELIONHacktool.Equation
CURSEMAGICHacktool.Equation
CURSENAGHacktool.Equation
CURSEQUAKEHacktool.Equation
CURSERAZORHacktool.Equation
CURSEROOTHacktool.Equation
CURSESALSAHacktool.Equation
CURSESLEEPYHacktool
CURSETAILSHacktool.Equation
CURSETINGLEHacktool.Equation
CURSEWHAMHacktool.Equation
CURSEYOBackdoor.Equation
CURSEZINGERHacktool.Equation
DAIRYFARMNot Malicious
DEWDROPHacktool.Equation
DITTOCLASSNot Malicious
DRAFTBAGGERNot Malicious
DUBMOATHacktool
EARLYSHOVELLinux.Valsheesy
EBBISLANDHacktool
EBBSSHAVEHacktool
ECHODOLPHINNot Malicious
EGGBARONNot Malicious
ELATEDMONKEYTrojan.Malscript
ELECTRICSLIDETrojan.Malscript
​Linux.Trojan
ELEGANTEAGLETrojan.Malscript
Linux.Trojan
ELGINGAMBLEHacktool
ELIDESKEWNot malicious
ENDLESSDONUTHacktool
ENEMYRUNHacktool
ENGLANDBOGYNot malicious
ENSANot malicious
ENTERSEEDHacktool
ENTRYMANORNot malicious
ENVISIONCOLLISIONTrojan.Malscript
EPICHEROLinux.Cheepori
EXCELBERWICKNot malicious
EXPITATEZEKENot malicious
EXTREMEPARRNot malicious
JACKPOPTrojan.Malscript
MAGICJACKLinux.Magicjack
MYSTICTUNNELSHacktool
ORLEANSTRIDEHacktoo.Equation
POPTOPNot malicious
PORKHacktool
SECONDDATEHacktool
SHENTYSDELIGHTHacktool
SICKLESTARNot malicious
SKIMCOUNTRYHacktool.Equation
SLYHERETICHacktool.Equation
STOICSURGEONHacktool.Equation
STRIFEWORLDHacktool.Equation
SUAVEEYFULHacktool
SUCTIONCHARHacktool.Equation
VIOLETSPIRITUnder Investigation
WATCHERHacktool.Equation
YELLOWSPIRITNot Malicious

Changelog:

June 21: Updated "Dont Forget your base" coverage infromation 


Viewing all articles
Browse latest Browse all 818

Trending Articles



<script src="https://jsc.adskeeper.com/r/s/rssing.com.1596347.js" async> </script>