This repository has been archived on 2025-09-14. You can view files and clone it, but cannot push or open issues or pull requests.
Files
stellar-stellar/decoders/glimpse_detector/libprotoident/udp/lpi_zeroaccess_udp.cc
2024-08-21 09:38:18 +08:00

131 lines
3.4 KiB
C++

/*
*
* Copyright (c) 2011-2016 The University of Waikato, Hamilton, New Zealand.
* All rights reserved.
*
* This file is part of libprotoident.
*
* This code has been developed by the University of Waikato WAND
* research group. For further information please see http://www.wand.net.nz/
*
* libprotoident is free software; you can redistribute it and/or modify
* it under the terms of the GNU Lesser General Public License as published by
* the Free Software Foundation; either version 3 of the License, or
* (at your option) any later version.
*
* libprotoident is distributed in the hope that it will be useful,
* but WITHOUT ANY WARRANTY; without even the implied warranty of
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
* GNU Lesser General Public License for more details.
*
* You should have received a copy of the GNU Lesser General Public License
* along with this program. If not, see <http://www.gnu.org/licenses/>.
*
*
*/
#include <string.h>
#include "libprotoident.h"
#include "proto_manager.h"
#include "proto_common.h"
/* This protocol is used by the ZeroAccess Trojan for P2P communication
* between infected hosts.
*
* http://www.kindsight.net/sites/default/files/Kindsight_Malware_Analysis-New_CC_protocol_ZeroAccess-final2.pdf
*/
static inline bool using_zeroaccess_port(lpi_data_t *data) {
switch(data->server_port) {
case 16464:
case 16465:
case 16470:
case 16471:
return true;
}
switch(data->client_port) {
case 16464:
case 16465:
case 16470:
case 16471:
return true;
}
return false;
}
static inline bool match_zeroaccess_udp(lpi_data_t *data, lpi_module_t *mod UNUSED) {
/* ZeroAccess uses specific ports for talking to peers */
if (!using_zeroaccess_port(data)) {
return false;
}
/* The infected host always sends a 16 byte UDP packet to the
* peer - the response packet size is based solely on what we've
* observed in the wild.
*
* Since both payloads begin with a 32 byte checksum, we can't
* do much based on payload patterns */
/* Pretty unlikely that the CRC will be exactly 0, but 0 is a
* common payload for other UDP protocols */
if (data->payload[0] == 0 && data->payload_len[0] != 0)
return false;
if (data->payload[1] == 0 && data->payload_len[1] != 0)
return false;
if (data->payload_len[0] == 16) {
if (data->payload_len[1] == 848)
return true;
if (data->payload_len[1] == 988)
return true;
if (data->payload_len[1] == 568)
return true;
/* If no response, lets at least force it to be on the
* default port before reporting a match */
if (data->payload_len[1] == 0) {
if (data->server_port == 16464)
return true;
if (data->client_port == 16464)
return true;
}
}
if (data->payload_len[1] == 16) {
if (data->payload_len[0] == 848)
return true;
if (data->payload_len[0] == 988)
return true;
if (data->payload_len[0] == 568)
return true;
/* If no response, lets at least force it to be on the
* default port before reporting a match */
if (data->payload_len[0] == 0) {
if (data->server_port == 16464)
return true;
if (data->client_port == 16464)
return true;
}
}
return false;
}
static lpi_module_t lpi_zeroaccess_udp = {
LPI_PROTO_UDP_ZEROACCESS,
LPI_CATEGORY_MALWARE,
"ZeroAccess_UDP",
40,
match_zeroaccess_udp
};
void register_zeroaccess_udp(LPIModuleMap *mod_map) {
register_protocol(&lpi_zeroaccess_udp, mod_map);
}