Craig Lightning The Moth Trojan
Craig Lightning The Moth Trojan
Craig Lightning The Moth Trojan
Paul Craig
Security-Assessment.com
© 2008 Security-Assessment.com
Who Am I?
Paul Craig, Principal Security Consultant
y
Security-Assessment.com
Myy Role
Application Penetration Tester
Published Security Author
Active Security Researcher
Devoted Hacker
Feedback?
Email: [email protected]
Just buy me a beer!
© 2008 Security-Assessment.com
The Moth Trojan
© 2008 Security-Assessment.com
The Moth Trojan
© 2008 Security-Assessment.com
The Moth Trojan
Screw Anti
Anti-Virus,
Virus Call A Priest!
“Help, my computer is suffering from demonic possession.”
© 2008 Security-Assessment.com
The Moth Trojan
© 2008 Security-Assessment.com
The Moth Trojan
Extrinsic Events
(being outside a thing; outward or external; operating or coming from without)
Intrinsic Events
((belonging
g g to a thing
g byy its veryy nature))
© 2008 Security-Assessment.com
The Moth Trojan
To Put It Simply:
When you do anything in Windows, you create a WMI event.
These
h events can be
b subscribed
b b d to using an event consumer.
WMI will forward any raised event to the associated consumer.
© 2008 Security-Assessment.com
The Moth Trojan
© 2008 Security-Assessment.com
The Moth Trojan
Malicious
l Managed
d Object
b Format Code
d
Multiple, malicious, persistent, ActiveScript event consumers.
100% VBScript/WQL
Consumes __InstanceCreationEvent.
Subscribes to events created when you run specific executables.
Works on Vista.
Executed as NETWORK_SERVICE.
SeImpersonate privileges available.
© 2008 Security-Assessment.com
Example:
© 2008 Security-Assessment.com
The Moth Trojan
© 2008 Security-Assessment.com
The Moth Trojan
© 2008 Security-Assessment.com
The Moth Trojan
Application
pp Level Trojan.
j
Typical Trojan technique is “Getting Low”
Manipulate API calls, Kernel calls, Hardware calls.
© 2008 Security-Assessment.com
The Moth Trojan
Is It Really Undetectable?
You CAN detect the Moth Trojan. /
Requires WMI Administrator
d tools.
l
WMI console application.
Enumerate all event consumers.
© 2008 Security-Assessment.com
The Moth Trojan
Speed
p Trojan:
j
Activates when the CPU fan slows below 100 RPM.
Worst Day Trojan:
Lay dormant until twenty bad sectors are reported in the
hard drive.
Infect Your Friends
Copy
py malicious files to anyy USB keyy inserted.
Rootkit Dropper & Executor
Re
Re-deploy
deploy an existing rootkit whenever it is removed
removed.
© 2008 Security-Assessment.com
The Moth Trojan
Source Code:
Currently Unpublished Source Code:
h
http://ha.cked.net/moth.zip
//h k d / h
© 2008 Security-Assessment.com