17

Table of Contents 2 - F5 Networks...Author Debbie Walkowski Created Date 20161213213407Z

  • Upload
    others

  • View
    1

  • Download
    0

Embed Size (px)

Citation preview

Page 1: Table of Contents 2 - F5 Networks...Author Debbie Walkowski Created Date 20161213213407Z

Page 2: Table of Contents 2 - F5 Networks...Author Debbie Walkowski Created Date 20161213213407Z

Table of Contents .................................................................................................................... 2

Table of Figures ....................................................................................................................... 2

INTRODUCTION ....................................................................................................................... 3

PROPAGATION ........................................................................................................................ 3

WHY IS DYRE DIFFICULT TO DETECT? ........................................................................................ 4

FRAUD TECHNIQUES ................................................................................................................ 4 UNIQUE FAKE PAGE FRAUD FLOW ..................................................................................................... 5 UNIQUE SERVER-SIDE WEB-INJECTS .................................................................................................. 8 GRABBER MODULE ........................................................................................................................... 9

DYRE CONFIGURATION REVEALED .......................................................................................... 10

C&C COMMUNICATION AND EVASION TECHNIQUES ............................................................... 12

CRYPTO EVOLUTION ............................................................................................................... 13

SUMMARY .............................................................................................................................. 14 About F5 Labs ................................................................................................................................. 14

APPENDIX A: DYRE COMMANDS AND ERROR HANDLING ........................................................ 15

APPENDIX B: C&C COMMUNICATION ...................................................................................... 16

Page 3: Table of Contents 2 - F5 Networks...Author Debbie Walkowski Created Date 20161213213407Z
Page 4: Table of Contents 2 - F5 Networks...Author Debbie Walkowski Created Date 20161213213407Z
Page 5: Table of Contents 2 - F5 Networks...Author Debbie Walkowski Created Date 20161213213407Z
Page 6: Table of Contents 2 - F5 Networks...Author Debbie Walkowski Created Date 20161213213407Z
Page 7: Table of Contents 2 - F5 Networks...Author Debbie Walkowski Created Date 20161213213407Z
Page 8: Table of Contents 2 - F5 Networks...Author Debbie Walkowski Created Date 20161213213407Z
Page 9: Table of Contents 2 - F5 Networks...Author Debbie Walkowski Created Date 20161213213407Z
Page 10: Table of Contents 2 - F5 Networks...Author Debbie Walkowski Created Date 20161213213407Z
Page 11: Table of Contents 2 - F5 Networks...Author Debbie Walkowski Created Date 20161213213407Z
Page 12: Table of Contents 2 - F5 Networks...Author Debbie Walkowski Created Date 20161213213407Z
Page 13: Table of Contents 2 - F5 Networks...Author Debbie Walkowski Created Date 20161213213407Z
Page 14: Table of Contents 2 - F5 Networks...Author Debbie Walkowski Created Date 20161213213407Z
Page 15: Table of Contents 2 - F5 Networks...Author Debbie Walkowski Created Date 20161213213407Z

COMMAND EXPLANATION

ERROR

Page 16: Table of Contents 2 - F5 Networks...Author Debbie Walkowski Created Date 20161213213407Z

EFFECT COMMUNICATION