{"id":3373,"date":"2010-09-25T12:56:29","date_gmt":"2010-09-25T19:56:29","guid":{"rendered":"http:\/\/blog.webroot.com\/?p=3373"},"modified":"2018-01-30T11:13:54","modified_gmt":"2018-01-30T18:13:54","slug":"civilization-5-torrent-bonus-uncivilized-malware","status":"publish","type":"post","link":"https://www.webroot.com/blog/2010\/09\/25\/civilization-5-torrent-bonus-uncivilized-malware\/","title":{"rendered":"Civilization 5 Torrent Bonus: Uncivilized Malware"},"content":{"rendered":"<p class=\"getsocial\" style=\"text-align: left;\"><img decoding=\"async\" style=\"border: 0; margin: 0; padding: 0;\" alt=\"\" src=\"http:\/\/getsocialserver.files.wordpress.com\/2009\/08\/gs2001.png\" \/><a title=\"Add to Facebook\" href=\"http:\/\/www.facebook.com\/sharer.php?u=http:\/\/blog.webroot.com\/2010\/09\/25\/civilization-5-torrent-bonus-uncivilized-malware\" target=\"_blank\" rel=\"nofollow\"><img decoding=\"async\" style=\"border: 0; margin: 0; padding: 0;\" alt=\"Add to Facebook\" src=\"http:\/\/getsocialserver.files.wordpress.com\/2009\/08\/gs2011.png\" \/><\/a><a title=\"Add to Digg\" href=\"http:\/\/digg.com\/submit?phase=2&amp;url=http%3A%2F%2Fblog.webroot.com%2F2010%2F09%2F25%2Fcivilization-5-torrent-bonus-uncivilized-malware&amp;title=Civilization%205%20Torrent%20Bonus%3A%20Uncivilized%20Malware\" target=\"_blank\" rel=\"nofollow\"><img decoding=\"async\" style=\"border: 0; margin: 0; padding: 0;\" alt=\"Add to Digg\" src=\"http:\/\/getsocialserver.files.wordpress.com\/2009\/08\/gs2021.png\" \/><\/a><a title=\"Add to Del.icio.us\" href=\"http:\/\/del.icio.us\/post?url=http%3A%2F%2Fblog.webroot.com%2F2010%2F09%2F25%2Fcivilization-5-torrent-bonus-uncivilized-malware&amp;title=Civilization%205%20Torrent%20Bonus%3A%20Uncivilized%20Malware\" target=\"_blank\" rel=\"nofollow\"><img decoding=\"async\" style=\"border: 0; margin: 0; padding: 0;\" alt=\"Add to Del.icio.us\" src=\"http:\/\/getsocialserver.files.wordpress.com\/2009\/08\/gs2031.png\" \/><\/a><a title=\"Add to Stumbleupon\" href=\"http:\/\/www.stumbleupon.com\/submit?url=http%3A%2F%2Fblog.webroot.com%2F2010%2F09%2F25%2Fcivilization-5-torrent-bonus-uncivilized-malware&amp;title=Civilization%205%20Torrent%20Bonus%3A%20Uncivilized%20Malware\" target=\"_blank\" rel=\"nofollow\"><img decoding=\"async\" style=\"border: 0; margin: 0; padding: 0;\" alt=\"Add to Stumbleupon\" src=\"http:\/\/getsocialserver.files.wordpress.com\/2009\/08\/gs2041.png\" \/><\/a><a title=\"Add to Reddit\" href=\"http:\/\/reddit.com\/submit?url=http%3A%2F%2Fblog.webroot.com%2F2010%2F09%2F25%2Fcivilization-5-torrent-bonus-uncivilized-malware&amp;title=Civilization%205%20Torrent%20Bonus%3A%20Uncivilized%20Malware\" target=\"_blank\" rel=\"nofollow\"><img decoding=\"async\" style=\"border: 0; margin: 0; padding: 0;\" alt=\"Add to Reddit\" src=\"http:\/\/getsocialserver.files.wordpress.com\/2009\/08\/gs2051.png\" \/><\/a><a title=\"Add to Blinklist\" href=\"http:\/\/www.blinklist.com\/index.php?Action=Blink\/addblink.php&amp;Description=&amp;Url=http%3A%2F%2Fblog.webroot.com%2F2010%2F09%2F25%2Fcivilization-5-torrent-bonus-uncivilized-malware&amp;Title=Civilization%205%20Torrent%20Bonus%3A%20Uncivilized%20Malware\" target=\"_blank\" rel=\"nofollow\"><img decoding=\"async\" style=\"border: 0; margin: 0; padding: 0;\" alt=\"Add to Blinklist\" src=\"http:\/\/getsocialserver.files.wordpress.com\/2009\/08\/gs2061.png\" \/><\/a><a title=\"Add to Twitter\" href=\"http:\/\/twitter.com\/home\/?status=Civilization%205%20Torrent%20Bonus%3A%20Uncivilized%20Malware+%40+http%3A%2F%2Fblog.webroot.com%2F2010%2F09%2F25%2Fcivilization-5-torrent-bonus-uncivilized-malware\" target=\"_blank\" rel=\"nofollow\"><img decoding=\"async\" style=\"border: 0; margin: 0; padding: 0;\" alt=\"Add to Twitter\" src=\"http:\/\/getsocialserver.files.wordpress.com\/2009\/08\/gs2071.png\" \/><\/a><a title=\"Add to Technorati\" href=\"http:\/\/www.technorati.com\/faves?add=http:\/\/blog.webroot.com\/2010\/09\/25\/civilization-5-torrent-bonus-uncivilized-malware\" target=\"_blank\" rel=\"nofollow\"><img decoding=\"async\" style=\"border: 0; margin: 0; padding: 0;\" alt=\"Add to Technorati\" src=\"http:\/\/getsocialserver.files.wordpress.com\/2009\/08\/gs2081.png\" \/><\/a><a title=\"Add to Yahoo Buzz\" href=\"http:\/\/buzz.yahoo.com\/buzz?targetUrl=http%3A%2F%2Fblog.webroot.com%2F2010%2F09%2F25%2Fcivilization-5-torrent-bonus-uncivilized-malware&amp;headline=Civilization%205%20Torrent%20Bonus%3A%20Uncivilized%20Malware\" target=\"_blank\" rel=\"nofollow\"><img decoding=\"async\" style=\"border: 0; margin: 0; padding: 0;\" alt=\"Add to Yahoo Buzz\" src=\"http:\/\/getsocialserver.files.wordpress.com\/2009\/08\/gs2091.png\" \/><\/a><a title=\"Add to Newsvine\" href=\"http:\/\/www.newsvine.com\/_wine\/save?u=http%3A%2F%2Fblog.webroot.com%2F2010%2F09%2F25%2Fcivilization-5-torrent-bonus-uncivilized-malware&amp;h=Civilization%205%20Torrent%20Bonus%3A%20Uncivilized%20Malware\" target=\"_blank\" rel=\"nofollow\"><img decoding=\"async\" style=\"border: 0; margin: 0; padding: 0;\" alt=\"Add to Newsvine\" src=\"http:\/\/getsocialserver.files.wordpress.com\/2009\/08\/gs2101.png\" \/><\/a><img decoding=\"async\" style=\"border: 0; margin: 0; padding: 0;\" alt=\"\" src=\"http:\/\/getsocialserver.files.wordpress.com\/2009\/08\/gs2111.png\" \/><\/p>\n<p><a href=\"http:\/\/webrootblog.files.wordpress.com\/2010\/09\/20100925_civ5_tor_crop_h.jpg\"><img decoding=\"async\" loading=\"lazy\" class=\"alignleft size-full wp-image-3375\" title=\"20100925_civ5_tor_crop_h\" alt=\"\" src=\"http:\/\/webrootblog.files.wordpress.com\/2010\/09\/20100925_civ5_tor_crop_h.jpg\" width=\"350\" height=\"184\" \/><\/a>Bootlegged copies of <strong>Civilization 5<\/strong>, the highly anticipated, just-released real time strategy game, are already popping up in file sharing services. And, as we&#8217;ve come to expect, some of the pirated copies of the game come with that little something special &#8212; malicious components.<\/p>\n<p>One of our Threat Research Analysts, who also happens to be an avid gamer, started looking for pirated copies of the game Friday morning and, within five minutes of looking, found Trojans in some of the torrents in circulation. I&#8217;ve chosen to focus on one of these files, not only because it was the first we saw, but also the most interesting. The Trojan, bundled in a torrent with the ISO image of the Civ 5 installation disc, is called &#8216;<strong>read me before burn.exe<\/strong>&#8216; (MD5: 2f7ff2ecef4b5cf1c9679f79d9b72518).<\/p>\n<p>On a typical Windows system, the file appears to be a text document, but only because it uses a file icon of a text document. With the file extension visible, however, it&#8217;s clearly an .exe with a mission.<\/p>\n<p><!--more--><a href=\"http:\/\/webrootblog.files.wordpress.com\/2010\/09\/20100925_civ5_files_h.jpg\"><img decoding=\"async\" loading=\"lazy\" class=\"alignnone size-full wp-image-3379\" title=\"20100925_civ5_files_h\" alt=\"\" src=\"http:\/\/webrootblog.files.wordpress.com\/2010\/09\/20100925_civ5_files_h.jpg\" width=\"476\" height=\"91\" \/><\/a><\/p>\n<p>The file, a dropper, is interesting for other reasons as well. As of last night, there were no detections for the file on Virustotal, which means other antivirus companies hadn&#8217;t yet pulled it into their systems.<\/p>\n<p>The &#8216;read me&#8217; dropper drops a program named &#8216;<strong>my-slide-show-picture.exe<\/strong>&#8216; (MD5: 6cf871199432f0dd9a669427f58155db) into the currently-logged-in-user&#8217;s <em>Application DataMicrosoft<\/em> folder, writes a run key to start up <em>slide-show<\/em> at reboot (with the value <em>window update<\/em>), then quits.<\/p>\n<p><a href=\"http:\/\/webrootblog.files.wordpress.com\/2010\/09\/20100925_civ5_myslide_properties.jpg\"><img decoding=\"async\" loading=\"lazy\" class=\"alignnone size-full wp-image-3389\" title=\"20100925_civ5_myslide_properties\" alt=\"\" src=\"http:\/\/webrootblog.files.wordpress.com\/2010\/09\/20100925_civ5_myslide_properties.jpg\" width=\"378\" height=\"144\" \/><\/a><\/p>\n<p>Here&#8217;s the interesting part: Every time <em>slide-show<\/em> executes, it writes the entire source code for another payload &#8212; a password stealer &#8212; onto the infected computer. <em>Slide-show<\/em> then compiles this dropped source code, using the Visual Basic Compiler,into a program with an eight-random-character filename that&#8217;s exactly 136192 bytes in size. This happens every time the computer executes<em> slide-show<\/em> &#8212; upon the initial execution and at every reboot. This breaks AV detection of the compiled payload that relies on a static MD5 hash.<\/p>\n<p><a href=\"http:\/\/webrootblog.files.wordpress.com\/2010\/09\/20100925_civ5_procexp_vbc.jpg\"><img decoding=\"async\" loading=\"lazy\" class=\"alignnone size-full wp-image-3384\" title=\"20100925_civ5_procexp_vbc_crop\" alt=\"\" src=\"http:\/\/webrootblog.files.wordpress.com\/2010\/09\/20100925_civ5_procexp_vbc_crop.jpg\" width=\"781\" height=\"34\" \/><\/a><\/p>\n<p>Now for the Stupid Malware Tricks part: When <em>slide-show<\/em> writes out its source code, which is all embedded in<em> slide-show<\/em> as base64-encoded text, anyone can read it all. That means we, the malware analysts of the world, can see the full functionality of the program without needing to actually do anything more than open it in a text editor.<\/p>\n<p><a href=\"http:\/\/webrootblog.files.wordpress.com\/2010\/09\/20100925_civ5_source_motdepasse.jpg\"><img decoding=\"async\" loading=\"lazy\" class=\"alignnone size-full wp-image-3388\" title=\"20100925_civ5_source_motdepasse_crop\" alt=\"\" src=\"http:\/\/webrootblog.files.wordpress.com\/2010\/09\/20100925_civ5_source_motdepasse_crop.jpg\" width=\"291\" height=\"64\" \/><\/a><\/p>\n<p>The original source appears to have been written by someone who is a native French speaker, because it is heavily commented in French, which is actually quite informative. This helpful malware author, whose name is apparently <em>Albert<\/em>, tipped us off to useful hints about what he did, with comments like <em>mot de passe<\/em> (password) and <em>ecrivant un compte MSN Messenger <\/em>(write out the MSN Messenger account) sprinkled throughout.<\/p>\n<p><a href=\"http:\/\/webrootblog.files.wordpress.com\/2010\/09\/20100925_civ5_source_ecrivant.jpg\"><img decoding=\"async\" loading=\"lazy\" class=\"alignnone size-full wp-image-3382\" title=\"20100925_civ5_source_ecrivant_crop\" alt=\"\" src=\"http:\/\/webrootblog.files.wordpress.com\/2010\/09\/20100925_civ5_source_ecrivant_crop.jpg\" width=\"394\" height=\"52\" \/><\/a><\/p>\n<p>For too long, I thought my study of French in college would yield no useful purpose in my malware analysis day job. Thanks, Al, for making it all worthwhile.<\/p>\n<p><a href=\"http:\/\/webrootblog.files.wordpress.com\/2010\/09\/20100925_civ5_source_filelist.jpg\"><img decoding=\"async\" loading=\"lazy\" class=\"alignnone size-full wp-image-3386\" title=\"20100925_civ5_source_filelist\" alt=\"\" src=\"http:\/\/webrootblog.files.wordpress.com\/2010\/09\/20100925_civ5_source_filelist.jpg\" width=\"210\" height=\"170\" \/><\/a><\/p>\n<p>We also can see that the password stealer component is built out of nine separate components, each of which adds different functionality to the end product. Among the functionality is the ability of the program to steal passwords for MSN messenger, stored passwords in the Protected Storage area of Windows, passwords saved to Mozilla Firefox&#8217;s password storage, and elsewhere. The file concatenates any stolen information and holds it in anticipation of being able to upload it to the file&#8217;s command and control server, which is assigned to two subdomains managed through the No-IP dynamic DNS service. As I write this, the IP address where the payload attempts to communicate is offline, and the account&#8217;s been shut down.<\/p>\n<p>We&#8217;ve added detection for &#8216;slide-show&#8217; as well as &#8216;read me&#8217; to our definitions. What remains to be seen is whether would-be pirates will be dissuaded from bootlegging copies of the game, or if <em>Albert <\/em>here still ended up with a boatload of stolen credentials. I guess we&#8217;ll find out next week.<br \/>\n<a title=\"wordpress blog stats\" href=\"http:\/\/www.statcounter.com\/wordpress.com\/\" target=\"_blank\"><img decoding=\"async\" alt=\"wordpress blog stats\" src=\"http:\/\/c.statcounter.com\/4868061\/0\/92d716bc\/1\/\" \/><\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Bootlegged copies of Civilization 5, the highly anticipated, just-released real time strategy game, are already popping up in file sharing services. And, as we&#8217;ve come to expect, some of the pirated copies of the game come with that little something special &#8212; malicious components. One of our Threat Research Analysts, who also happens to be [&hellip;]<\/p>\n","protected":false},"author":65,"featured_media":17052,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[3005],"tags":[],"yst_prominent_words":[3915,3485,7871,7857,3619,4379,3477,7859,7867,7861,7855,4441,7873,7865,7869,4509,6639,4269,7863,3471],"acf":[],"_links":{"self":[{"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/posts\/3373"}],"collection":[{"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/users\/65"}],"replies":[{"embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/comments?post=3373"}],"version-history":[{"count":1,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/posts\/3373\/revisions"}],"predecessor-version":[{"id":23609,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/posts\/3373\/revisions\/23609"}],"wp:featuredmedia":[{"embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/media\/17052"}],"wp:attachment":[{"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/media?parent=3373"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/categories?post=3373"},{"taxonomy":"post_tag","embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/tags?post=3373"},{"taxonomy":"yst_prominent_words","embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/yst_prominent_words?post=3373"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}