├── CRASHOVERRIDE 2016-06-12.yara ├── CRASHOVERRIDE IOC 2016-06-12.csv ├── LICENSE └── README.md /CRASHOVERRIDE 2016-06-12.yara: -------------------------------------------------------------------------------- 1 | import "pe" 2 | import "hash" 3 | 4 | rule dragos_crashoverride_suspicious_export 5 | { 6 | meta: 7 | description = "CRASHOVERRIDE v1 Suspicious Export" 8 | author = "Dragos Inc" 9 | 10 | condition: 11 | pe.exports("Crash") 12 | } 13 | 14 | rule dragos_crashoverride_suspcious 15 | { 16 | meta: 17 | description = "CRASHOVERRIDE v1 Wiper" 18 | author = "Dragos Inc" 19 | 20 | strings: 21 | $s0 = "SYS_BASCON.COM" fullword nocase wide 22 | $s1 = ".pcmp" fullword nocase wide 23 | $s2 = ".pcmi" fullword nocase wide 24 | $s3 = ".pcmt" fullword nocase wide 25 | $s4 = ".cin" fullword nocase wide 26 | 27 | condition: 28 | any of ($s*) and pe.exports("Crash") 29 | } 30 | 31 | 32 | rule dragos_crashoverride_name_search { 33 | meta: 34 | description = "CRASHOVERRIDE v1 Suspicious Strings and Export" 35 | author = "Dragos Inc" 36 | 37 | strings: 38 | $s0 = "101.dll" fullword nocase wide 39 | $s1 = "Crash101.dll" fullword nocase wide 40 | $s2 = "104.dll" fullword nocase wide 41 | $s3 = "Crash104.dll" fullword nocase wide 42 | $s4 = "61850.dll" fullword nocase wide 43 | $s5 = "Crash61850.dll" fullword nocase wide 44 | $s6 = "OPCClientDemo.dll" fullword nocase wide 45 | $s7 = "OPC" fullword nocase wide 46 | $s8 = "CrashOPCClientDemo.dll" fullword nocase wide 47 | $s9 = "D2MultiCommService.exe" fullword nocase wide 48 | $s10 = "CrashD2MultiCommService.exe" fullword nocase wide 49 | $s11 = "61850.exe" fullword nocase wide 50 | $s12 = "OPC.exe" fullword nocase wide 51 | $s13 = "haslo.exe" fullword nocase wide 52 | $s14 = "haslo.dat" fullword nocase wide 53 | 54 | condition: 55 | any of ($s*) and pe.exports("Crash") 56 | } 57 | 58 | rule dragos_crashoverride_hashes { 59 | 60 | meta: 61 | description = "CRASHOVERRIDE Malware Hashes" 62 | author = "Dragos Inc" 63 | 64 | condition: 65 | filesize < 1MB and 66 | hash.sha1(0, filesize) == "f6c21f8189ced6ae150f9ef2e82a3a57843b587d" or 67 | hash.sha1(0, filesize) == "cccce62996d578b984984426a024d9b250237533" or 68 | hash.sha1(0, filesize) == "8e39eca1e48240c01ee570631ae8f0c9a9637187" or 69 | hash.sha1(0, filesize) == "2cb8230281b86fa944d3043ae906016c8b5984d9" or 70 | hash.sha1(0, filesize) == "79ca89711cdaedb16b0ccccfdcfbd6aa7e57120a" or 71 | hash.sha1(0, filesize) == "94488f214b165512d2fc0438a581f5c9e3bd4d4c" or 72 | hash.sha1(0, filesize) == "5a5fafbc3fec8d36fd57b075ebf34119ba3bff04" or 73 | hash.sha1(0, filesize) == "b92149f046f00bb69de329b8457d32c24726ee00" or 74 | hash.sha1(0, filesize) == "b335163e6eb854df5e08e85026b2c3518891eda8" 75 | } 76 | 77 | rule dragos_crashoverride_moduleStrings { 78 | 79 | meta: 80 | description = "IEC-104 Interaction Module Program Strings" 81 | author = "Dragos Inc" 82 | 83 | strings: 84 | $s1 = "IEC-104 client: ip=%s; port=%s; ASDU=%u" nocase wide ascii 85 | $s2 = " MSTR ->> SLV" nocase wide ascii 86 | $s3 = " MSTR <<- SLV" nocase wide ascii 87 | $s4 = "Unknown APDU format !!!" nocase wide ascii 88 | $s5 = "iec104.log" nocase wide ascii 89 | 90 | condition: 91 | any of ($s*) 92 | } 93 | 94 | rule crashoverride_configReader 95 | { 96 | meta: 97 | description = "CRASHOVERRIDE v1 Config File Parsing" 98 | author = "Dragos Inc" 99 | 100 | strings: 101 | $s0 = { 68 e8 ?? ?? ?? 6a 00 e8 a3 ?? ?? ?? 8b f8 83 c4 ?8 } 102 | $s1 = { 8a 10 3a 11 75 ?? 84 d2 74 12 } 103 | $s2 = { 33 c0 eb ?? 1b c0 83 c8 ?? } 104 | $s3 = { 85 c0 75 ?? 8d 95 ?? ?? ?? ?? 8b cf ?? ?? } 105 | 106 | condition: 107 | all of them 108 | } 109 | 110 | rule crashoverride_weirdMutex 111 | { 112 | meta: 113 | description = "Blank mutex creation assoicated with CRASHOVERRIDE" 114 | author = "Dragos Inc" 115 | strings: 116 | $s1 = { 81 ec 08 02 00 00 57 33 ff 57 57 57 ff 15 ?? ?? 40 00 a3 ?? ?? ?? 00 85 c0 } 117 | $s2 = { 8d 85 ?? ?? ?? ff 50 57 57 6a 2e 57 ff 15 ?? ?? ?? 00 68 ?? ?? 40 00} 118 | 119 | condition: 120 | all of them 121 | } 122 | 123 | rule crashoverride_serviceStomper 124 | { 125 | meta: 126 | description = "Identify service hollowing and persistence setting" 127 | author = "Dragos Inc" 128 | 129 | strings: 130 | $s0 = { 33 c9 51 51 51 51 51 51 ?? ?? ?? } 131 | $s1 = { 6a ff 6a ff 6a ff 50 ff 15 24 ?? 40 00 ff ?? ?? ff 15 20 ?? 40 00 } 132 | 133 | condition: 134 | all of them 135 | } 136 | 137 | rule crashoverride_wiperModuleRegistry 138 | { 139 | meta: 140 | description = "Registry Wiper functionality assoicated with CRASHOVERRIDE" 141 | author = "Dragos Inc" 142 | 143 | strings: 144 | $s0 = { 8d 85 a0 ?? ?? ?? 46 50 8d 85 a0 ?? ?? ?? 68 68 0d ?? ?? 50 } 145 | $s1 = { 6a 02 68 78 0b ?? ?? 6a 02 50 68 b4 0d ?? ?? ff b5 98 ?? ?? ?? ff 15 04 ?? ?? ?? } 146 | $s2 = { 68 00 02 00 00 8d 85 a0 ?? ?? ?? 50 56 ff b5 9c ?? ?? ?? ff 15 00 ?? ?? ?? 85 c0 } 147 | 148 | condition: 149 | all of them 150 | } 151 | 152 | rule crashoverride_wiperFileManipulation 153 | { 154 | meta: 155 | description = "File manipulation actions associated with CRASHOVERRIDE wiper" 156 | author = "Dragos Inc" 157 | 158 | strings: 159 | $s0 = { 6a 00 68 80 00 00 00 6a 03 6a 00 6a 02 8b f9 68 00 00 00 40 57 ff 15 1c ?? ?? ?? 8b d8 } 160 | $s2 = { 6a 00 50 57 56 53 ff 15 4c ?? ?? ?? 56 } 161 | 162 | condition: 163 | all of them 164 | } 165 | 166 | rule crashoverride_socketCreationArtifacts 167 | { 168 | meta: 169 | description = "Socket and connection creation functionality" 170 | author = "Dragos Inc" 171 | 172 | strings: 173 | $s0 = { c7 85 ?? fe ff ff 02 00 00 00 c7 85 ?? fe ff ff 01 00 00 00 c7 85 ?? fe ff ff 06 00 00 00 ff 15 ?? 91 01 10 } 174 | $s1 = { 6a 04 ?? ?? ?? fe ff ff 8d 85 ?? fe ff ff 50 68 06 10 00 68 ff ff 00 00 57 ff 15 ?? ?? ?? 01 10 } 175 | 176 | condition: 177 | all of them 178 | } 179 | 180 | rule crashoverride_finalCountdownToWiper 181 | { 182 | meta: 183 | description = "Countdown to wiper module loading" 184 | author = "Dragos Inc" 185 | 186 | strings: 187 | $s0 = { 68 80 ee 36 00 ff ?? ?? ?? 40 00 68 e8 09 41 00 ff ?? ?? ?? 40 00 85 c0 } 188 | $s1 = { 68 fc 09 41 00 50 ff ?? ?? ?? 40 00 85 c0 74 07 6a 00 ff d0 83 c4 04 } 189 | 190 | condition: 191 | all of them 192 | } 193 | -------------------------------------------------------------------------------- /CRASHOVERRIDE IOC 2016-06-12.csv: -------------------------------------------------------------------------------- 1 | TYPE,SUBTYPE,IOC,Description,ICS Kill Chain,Impact 2 | Host,Mutex Value,ApiPortection[a-z0-9]{3},Mutex value checked,Stage 2: Install,Recon 3 | Host,Mutex Value,,Mutex value created,Stage 2: Install,Recon 4 | Host,File,C:\Users\\imapi,File dropped and deleted after program exit,Stage 2: Install,Recon 5 | Host,Service Name,defragsvc,Name given to service start,Stage 2: C2,Remote Access 6 | Network,IP Address,195.16.88.6,External C2 server [DEC 2016] (likely TOR node at time of attack),Stage 2: C2,Remote Access 7 | Network,IP Address,93.115.27.57,External C2 server [DEC 2016] (likely TOR node at time of attack),Stage 2: C2,Remote Access 8 | Network,IP Address,5.39.218.152,External C2 server [DEC 2016] (likely TOR node at time of attack),Stage 2: C2,Remote Access 9 | Network,User Agent String,Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 5.1; InfoPath.1),Default user agent string used in C2 if unable to get system default user agent string,Stage 2: C2,Remote Access 10 | Host,Command Line,:\.exe -ip= -ports=,Command line arguments used to launch custom port scanner observed with malware. Command line logging required to track.,Stage 2: Develop,Recon 11 | Host,Registry Key,HKLM\SYSTEM\CurrentControlSet\Services\\ImagePath ,Change in Service Image Path in the system registry to point to malware allowing malware to restart on system reboot.,Stage 2: Installation,Persistence 12 | Host,SHA1 File Hash,F6C21F8189CED6AE150F9EF2E82A3A57843B587D,"Traffic to 10.15.1.69:3128, HTTP CONNECT to 5.39.218.152:443. Backdoor/RAT. ",Phase2: C2,Remote Access 13 | Host,SHA1 File Hash,CCCCE62996D578B984984426A024D9B250237533,"Traffic to 10.15.1.69:3128, HTTP CONNECT to 5.39.218.152:443. Backdoor/RAT.",Phase2: C2,Remote Access 14 | Host,SHA1 File Hash,8E39ECA1E48240C01EE570631AE8F0C9A9637187,Backdoor/RAT Proxy + HTTP CONNECT to 93.115.27.57:443. ,Phase2: C2,Remote Access 15 | Host,SHA1 File Hash,2CB8230281B86FA944D3043AE906016C8B5984D9,Backdoor/RAT Proxy + HTTP CONNECT to 95.16.88.6:443 ,Phase2: C2,Remote Access 16 | Host,SHA1 File Hash,79CA89711CDAEDB16B0CCCCFDCFBD6AA7E57120A,"Launcher for payload DLL. Takes input as three command line parameters – working directory, module, and config file.",Stage 2: Attack,Loss of Control 17 | Host,SHA1 File Hash,94488F214B165512D2FC0438A581F5C9E3BD4D4C,Module for 104 effect. Exports 'Crash' which is invoked by launcher. Functionality requires config file. ,Stage 2: Attack,Loss of Control 18 | Host,SHA1 File Hash,5A5FAFBC3FEC8D36FD57B075EBF34119BA3BFF04,"Wiper module, wipes list of files by extension, removes system processes, and makes registry changes to prevent system boot. ",Stage 2: Attack,Destruction 19 | Host,SHA1 File Hash,B92149F046F00BB69DE329B8457D32C24726EE00,"Wiper module, wipes list of files by extension, removes system processes, and makes registry changes to prevent system boot. ",Stage 2: Attack,Destruction 20 | Host,SHA1 File Hash,B335163E6EB854DF5E08E85026B2C3518891EDA8,Custom-built port scanner. ,Stage 2: Develop,Recon 21 | Host,SHA1 File Hash,7fAC2EDDF22FF692E1B4E7F99910E5DBB51295E6,OPC Data Access protocol enumeration of servers and addresses ,Stage 2: Attack,Loss of Control 22 | Host,SHA1 File Hash,ECF6ADF20A7137A84A1B319CCAA97CB0809A8454 ,IEC-61850 enumeration and address manipulation,Stage 2: Attack,Loss of Control 23 | Host,Filename,opc.exe,OPC Data Access protocol enumeration of servers and addresses ,Stage 2: Attack,Loss of Control 24 | Host,Filename,61850.exe,IEC-61850 enumeration and address manipulation,Stage 2: Attack,Loss of Control 25 | Host,Filename,haslo.exe,"Wiper module, wipes list of files by extension, removes system processes, and makes registry changes to prevent system boot. ",Stage 2: Attack,Destruction 26 | Host,Filename,104.dll,IEC-104 module,Stage 2: Attack,Loss of Control 27 | Host,Filename,haslo.dat,Wiper module,Stage 2: Attack,Destruction 28 | OPC Server,OPC Group,Aabdul,OPC DA Module,Stage 2: Attack,Loss of Visibility 29 | -------------------------------------------------------------------------------- /LICENSE: -------------------------------------------------------------------------------- 1 | Apache License 2 | Version 2.0, January 2004 3 | http://www.apache.org/licenses/ 4 | 5 | TERMS AND CONDITIONS FOR USE, REPRODUCTION, AND DISTRIBUTION 6 | 7 | 1. Definitions. 8 | 9 | "License" shall mean the terms and conditions for use, reproduction, 10 | and distribution as defined by Sections 1 through 9 of this document. 11 | 12 | "Licensor" shall mean the copyright owner or entity authorized by 13 | the copyright owner that is granting the License. 14 | 15 | "Legal Entity" shall mean the union of the acting entity and all 16 | other entities that control, are controlled by, or are under common 17 | control with that entity. For the purposes of this definition, 18 | "control" means (i) the power, direct or indirect, to cause the 19 | direction or management of such entity, whether by contract or 20 | otherwise, or (ii) ownership of fifty percent (50%) or more of the 21 | outstanding shares, or (iii) beneficial ownership of such entity. 22 | 23 | "You" (or "Your") shall mean an individual or Legal Entity 24 | exercising permissions granted by this License. 25 | 26 | "Source" form shall mean the preferred form for making modifications, 27 | including but not limited to software source code, documentation 28 | source, and configuration files. 29 | 30 | "Object" form shall mean any form resulting from mechanical 31 | transformation or translation of a Source form, including but 32 | not limited to compiled object code, generated documentation, 33 | and conversions to other media types. 34 | 35 | "Work" shall mean the work of authorship, whether in Source or 36 | Object form, made available under the License, as indicated by a 37 | copyright notice that is included in or attached to the work 38 | (an example is provided in the Appendix below). 39 | 40 | "Derivative Works" shall mean any work, whether in Source or Object 41 | form, that is based on (or derived from) the Work and for which the 42 | editorial revisions, annotations, elaborations, or other modifications 43 | represent, as a whole, an original work of authorship. For the purposes 44 | of this License, Derivative Works shall not include works that remain 45 | separable from, or merely link (or bind by name) to the interfaces of, 46 | the Work and Derivative Works thereof. 47 | 48 | "Contribution" shall mean any work of authorship, including 49 | the original version of the Work and any modifications or additions 50 | to that Work or Derivative Works thereof, that is intentionally 51 | submitted to Licensor for inclusion in the Work by the copyright owner 52 | or by an individual or Legal Entity authorized to submit on behalf of 53 | the copyright owner. For the purposes of this definition, "submitted" 54 | means any form of electronic, verbal, or written communication sent 55 | to the Licensor or its representatives, including but not limited to 56 | communication on electronic mailing lists, source code control systems, 57 | and issue tracking systems that are managed by, or on behalf of, the 58 | Licensor for the purpose of discussing and improving the Work, but 59 | excluding communication that is conspicuously marked or otherwise 60 | designated in writing by the copyright owner as "Not a Contribution." 61 | 62 | "Contributor" shall mean Licensor and any individual or Legal Entity 63 | on behalf of whom a Contribution has been received by Licensor and 64 | subsequently incorporated within the Work. 65 | 66 | 2. Grant of Copyright License. Subject to the terms and conditions of 67 | this License, each Contributor hereby grants to You a perpetual, 68 | worldwide, non-exclusive, no-charge, royalty-free, irrevocable 69 | copyright license to reproduce, prepare Derivative Works of, 70 | publicly display, publicly perform, sublicense, and distribute the 71 | Work and such Derivative Works in Source or Object form. 72 | 73 | 3. Grant of Patent License. Subject to the terms and conditions of 74 | this License, each Contributor hereby grants to You a perpetual, 75 | worldwide, non-exclusive, no-charge, royalty-free, irrevocable 76 | (except as stated in this section) patent license to make, have made, 77 | use, offer to sell, sell, import, and otherwise transfer the Work, 78 | where such license applies only to those patent claims licensable 79 | by such Contributor that are necessarily infringed by their 80 | Contribution(s) alone or by combination of their Contribution(s) 81 | with the Work to which such Contribution(s) was submitted. If You 82 | institute patent litigation against any entity (including a 83 | cross-claim or counterclaim in a lawsuit) alleging that the Work 84 | or a Contribution incorporated within the Work constitutes direct 85 | or contributory patent infringement, then any patent licenses 86 | granted to You under this License for that Work shall terminate 87 | as of the date such litigation is filed. 88 | 89 | 4. Redistribution. You may reproduce and distribute copies of the 90 | Work or Derivative Works thereof in any medium, with or without 91 | modifications, and in Source or Object form, provided that You 92 | meet the following conditions: 93 | 94 | (a) You must give any other recipients of the Work or 95 | Derivative Works a copy of this License; and 96 | 97 | (b) You must cause any modified files to carry prominent notices 98 | stating that You changed the files; and 99 | 100 | (c) You must retain, in the Source form of any Derivative Works 101 | that You distribute, all copyright, patent, trademark, and 102 | attribution notices from the Source form of the Work, 103 | excluding those notices that do not pertain to any part of 104 | the Derivative Works; and 105 | 106 | (d) If the Work includes a "NOTICE" text file as part of its 107 | distribution, then any Derivative Works that You distribute must 108 | include a readable copy of the attribution notices contained 109 | within such NOTICE file, excluding those notices that do not 110 | pertain to any part of the Derivative Works, in at least one 111 | of the following places: within a NOTICE text file distributed 112 | as part of the Derivative Works; within the Source form or 113 | documentation, if provided along with the Derivative Works; or, 114 | within a display generated by the Derivative Works, if and 115 | wherever such third-party notices normally appear. The contents 116 | of the NOTICE file are for informational purposes only and 117 | do not modify the License. You may add Your own attribution 118 | notices within Derivative Works that You distribute, alongside 119 | or as an addendum to the NOTICE text from the Work, provided 120 | that such additional attribution notices cannot be construed 121 | as modifying the License. 122 | 123 | You may add Your own copyright statement to Your modifications and 124 | may provide additional or different license terms and conditions 125 | for use, reproduction, or distribution of Your modifications, or 126 | for any such Derivative Works as a whole, provided Your use, 127 | reproduction, and distribution of the Work otherwise complies with 128 | the conditions stated in this License. 129 | 130 | 5. Submission of Contributions. Unless You explicitly state otherwise, 131 | any Contribution intentionally submitted for inclusion in the Work 132 | by You to the Licensor shall be under the terms and conditions of 133 | this License, without any additional terms or conditions. 134 | Notwithstanding the above, nothing herein shall supersede or modify 135 | the terms of any separate license agreement you may have executed 136 | with Licensor regarding such Contributions. 137 | 138 | 6. Trademarks. This License does not grant permission to use the trade 139 | names, trademarks, service marks, or product names of the Licensor, 140 | except as required for reasonable and customary use in describing the 141 | origin of the Work and reproducing the content of the NOTICE file. 142 | 143 | 7. Disclaimer of Warranty. Unless required by applicable law or 144 | agreed to in writing, Licensor provides the Work (and each 145 | Contributor provides its Contributions) on an "AS IS" BASIS, 146 | WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or 147 | implied, including, without limitation, any warranties or conditions 148 | of TITLE, NON-INFRINGEMENT, MERCHANTABILITY, or FITNESS FOR A 149 | PARTICULAR PURPOSE. You are solely responsible for determining the 150 | appropriateness of using or redistributing the Work and assume any 151 | risks associated with Your exercise of permissions under this License. 152 | 153 | 8. Limitation of Liability. In no event and under no legal theory, 154 | whether in tort (including negligence), contract, or otherwise, 155 | unless required by applicable law (such as deliberate and grossly 156 | negligent acts) or agreed to in writing, shall any Contributor be 157 | liable to You for damages, including any direct, indirect, special, 158 | incidental, or consequential damages of any character arising as a 159 | result of this License or out of the use or inability to use the 160 | Work (including but not limited to damages for loss of goodwill, 161 | work stoppage, computer failure or malfunction, or any and all 162 | other commercial damages or losses), even if such Contributor 163 | has been advised of the possibility of such damages. 164 | 165 | 9. Accepting Warranty or Additional Liability. While redistributing 166 | the Work or Derivative Works thereof, You may choose to offer, 167 | and charge a fee for, acceptance of support, warranty, indemnity, 168 | or other liability obligations and/or rights consistent with this 169 | License. However, in accepting such obligations, You may act only 170 | on Your own behalf and on Your sole responsibility, not on behalf 171 | of any other Contributor, and only if You agree to indemnify, 172 | defend, and hold each Contributor harmless for any liability 173 | incurred by, or claims asserted against, such Contributor by reason 174 | of your accepting any such warranty or additional liability. 175 | 176 | END OF TERMS AND CONDITIONS 177 | 178 | APPENDIX: How to apply the Apache License to your work. 179 | 180 | To apply the Apache License to your work, attach the following 181 | boilerplate notice, with the fields enclosed by brackets "{}" 182 | replaced with your own identifying information. (Don't include 183 | the brackets!) The text should be enclosed in the appropriate 184 | comment syntax for the file format. We also recommend that a 185 | file or class name and description of purpose be included on the 186 | same "printed page" as the copyright notice for easier 187 | identification within third-party archives. 188 | 189 | Copyright {yyyy} {name of copyright owner} 190 | 191 | Licensed under the Apache License, Version 2.0 (the "License"); 192 | you may not use this file except in compliance with the License. 193 | You may obtain a copy of the License at 194 | 195 | http://www.apache.org/licenses/LICENSE-2.0 196 | 197 | Unless required by applicable law or agreed to in writing, software 198 | distributed under the License is distributed on an "AS IS" BASIS, 199 | WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. 200 | See the License for the specific language governing permissions and 201 | limitations under the License. 202 | -------------------------------------------------------------------------------- /README.md: -------------------------------------------------------------------------------- 1 | # CRASHOVERRIDE 2 | IOCs for CRASHOVERRIDE malware framework 3 | --------------------------------------------------------------------------------