/* * * Copyright (c) 2011-2016 The University of Waikato, Hamilton, New Zealand. * All rights reserved. * * This file is part of libprotoident. * * This code has been developed by the University of Waikato WAND * research group. For further information please see http://www.wand.net.nz/ * * libprotoident is free software; you can redistribute it and/or modify * it under the terms of the GNU Lesser General Public License as published by * the Free Software Foundation; either version 3 of the License, or * (at your option) any later version. * * libprotoident is distributed in the hope that it will be useful, * but WITHOUT ANY WARRANTY; without even the implied warranty of * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the * GNU Lesser General Public License for more details. * * You should have received a copy of the GNU Lesser General Public License * along with this program. If not, see . * * */ #include #include "libprotoident.h" #include "proto_manager.h" #include "proto_common.h" /* This protocol is used by the ZeroAccess Trojan for P2P communication * between infected hosts. * * http://www.kindsight.net/sites/default/files/Kindsight_Malware_Analysis-New_CC_protocol_ZeroAccess-final2.pdf */ static inline bool using_zeroaccess_port(lpi_data_t *data) { switch(data->server_port) { case 16464: case 16465: case 16470: case 16471: return true; } switch(data->client_port) { case 16464: case 16465: case 16470: case 16471: return true; } return false; } static inline bool match_zeroaccess_udp(lpi_data_t *data, lpi_module_t *mod UNUSED) { /* ZeroAccess uses specific ports for talking to peers */ if (!using_zeroaccess_port(data)) { return false; } /* The infected host always sends a 16 byte UDP packet to the * peer - the response packet size is based solely on what we've * observed in the wild. * * Since both payloads begin with a 32 byte checksum, we can't * do much based on payload patterns */ /* Pretty unlikely that the CRC will be exactly 0, but 0 is a * common payload for other UDP protocols */ if (data->payload[0] == 0 && data->payload_len[0] != 0) return false; if (data->payload[1] == 0 && data->payload_len[1] != 0) return false; if (data->payload_len[0] == 16) { if (data->payload_len[1] == 848) return true; if (data->payload_len[1] == 988) return true; if (data->payload_len[1] == 568) return true; /* If no response, lets at least force it to be on the * default port before reporting a match */ if (data->payload_len[1] == 0) { if (data->server_port == 16464) return true; if (data->client_port == 16464) return true; } } if (data->payload_len[1] == 16) { if (data->payload_len[0] == 848) return true; if (data->payload_len[0] == 988) return true; if (data->payload_len[0] == 568) return true; /* If no response, lets at least force it to be on the * default port before reporting a match */ if (data->payload_len[0] == 0) { if (data->server_port == 16464) return true; if (data->client_port == 16464) return true; } } return false; } static lpi_module_t lpi_zeroaccess_udp = { LPI_PROTO_UDP_ZEROACCESS, LPI_CATEGORY_MALWARE, "ZeroAccess_UDP", 40, match_zeroaccess_udp }; void register_zeroaccess_udp(LPIModuleMap *mod_map) { register_protocol(&lpi_zeroaccess_udp, mod_map); }