What I'm going to do in this 3 part blog is first download tini.exe which is a backdoor roughly 8 years old and submit it to Virus Total. This will be scanned by 33 different anti virus products and I will show the results. Then the fun bit, I will modify just the port that tini.exe listens on and its name then see how many report it as a backdoor!
Secondly I will show you how to wrap this backdoor into any application you want and have it install silently along with the real application. The third step will be a demonstration of a second machine connecting to this backdoor.
First download the tini installer. I will submit the default Tini.exe backdoor to virus total and see how many of the modern anti virus companies will detect this old backdoor.
![](https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjkCfujq04UnZ5S1c5gzB2Em_xaPDiFyhzDqY921v7AYq7IIbRJDXeAUoyv5gQP3uCm5blY32sXTMn0Wi8FGe1VBeu_iuhF1gwEHgmEsf9XxECC5T39Ri5ZlyuwgZ5XsWq4CuxLC7kTmA/s400/tini+scan+1.jpg)
![](https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhV5cTVIA1simhzyDH6ocYDfCQxtakq0Dv8JDY0-MENMpvhF3Uxi6PXO7ADbyW_iT-a-oeRmRIoyVNCpMCUXnB9sIYf_A8ORCj2G6CKgQPGZK49amu-rE8TeTiAz4Jo-tOhcC2LnbLo8g/s400/tini+scan+2.jpg)
All of the products have figured out that it is some kind of backdoor/trojan.
So now to crack tini open with a hex editor and find the default port value, 7777 in this case:
![](https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgVQUwvufsJZh34brC83R6he8-ydkrAegL_7h7xJCHLdPapwQ7QrASzyu0QPwWpKVt04D8Hsupuc6smuPhNJTLTMjvPavXxn2GbTLQmgQ6SKd7vIqc7eSTFh0XqsPnHFeX0CXnnkMNYpA/s400/hex+edit1.jpg)
Now I have picked a random port of 39846 (9ba6) and I will edit the backdoor as shown below:
![](https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhIEzMA-OHm_gMk1GBCYVkDzxEJuZB9HYgyBa3DNLTqbB_yMIET8LaP4NboipuWhYpL6H11plyVxVJhuvdOXxDfy8hH6tqkIoh9trfUrPH9uVXMLypikTpAd1BPjQ4ky8l7-AAzc_m_9g/s400/hex+edit2.jpg)
I saved the modified version as dave.exe and I will re-submit this Virus Total. The results are shown below:
![](https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgWECSHTfLqqOhckHoyqpx18ZS7m12mkYenRAkDiXTp1QRw8BweS-xWYiiXWHmY4yypprD93sHXjUVRZPY_EvzBS-xln0ABruC3JfohLxdMUu9TkHXhVaciXJh20XAmt6-h-EocU1xW4g/s400/tini+scan+3.jpg)
![](https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh49eby0-37U-x7FMzkw5fxX7ZdCJc2oYPZDDu0eQ0hS-ZunM0StK9-e5b41lEmpg2VUyYp1KNaDkPN8pyqGZfK2O16q4byeWW3jE_Y2ZhOiw12uWxt2WII9gUd2XgtWRw2od4ba3EI2Q/s400/tini+scan+4.jpg)
You can see that only 21 of the products now reported this file as being malicious. So by just changing the listening port and the name of the backdoor 21/33 products detected this 8 year old backdoor (first scan was 32/33). It is hardly inspiring reading is it?
Part two of this post will show you how to wrap this modified backdoor with a genuine application to install it in stealth on the victims machine.
Please be patient for post two, I have commitments to meet for the OWASP Code Review guide for the next few days before I can put part two up.
2 comments:
I believe that the obvious weakness of signature based detection systems has been well aired. This weakness being the premise that everything is good apart from what I 'know' to be bad. Tsk, any cynical information security hack would be appalled at such a thought. We all know that everything is bad apart from that which can be verifiably proven to be good and them only as long as it doesn't do anything unexpected.
"I believe that the obvious weakness of signature based detection systems has been well aired."
One might suggest that if the problem is that well known we would have anti virus products that would be more efficient in finding the "bad" things.
As for the cynicism, perhaps there is a hint of cynicism in my post but its aim was to show that anti virus is certainly not the silver bullet certain marketing material would have you believe ;-)
Dave
Post a Comment