Duqu

By GoldSparrow in Trojans
Translate To:

Threat Scorecard

Threat Level: 80 % (High)
Infected Computers: 76
First Seen: October 20, 2011
Last Seen: November 29, 2023
OS(es) Affected: Windows

Duqu may be the most sophisticated malware threat ever developed. Duqu is a notorious malware threat that was used between 2006 and 2012, which disappeared in 2012. However, it seems that a threat dubbed Duqu 2.0 was used in high-profile attacks against many targets around the world recently, including some of the most important computer security firms. Duqu, in its current form, gained notoriety because it targeted several zero-day vulnerabilities, which include CVE-2015-2360, CVE-2014-4148 and CVE-2014-6324. Some of Duqu's intended attacks seemed to be in some way linked to the highly publicized nuclear deal with Iran, as well as organizations operating in the Middle East. It is not easy to establish who is responsible for recent versions of the Duqu attack. It is very likely that it is a state-sponsored actor, with some strings pointing to Chinese hackers (although it is possible that these may be part of a false flag attack).

Duqu Has Been Updated Since its First Attack

The most recent Duqu attack seems to be derived from the older version of the Duqu worm directly. In its original form, Duqu was used to target industrial systems and was exposed in 2011. Duqu and similar threats such as Stuxnet were instrumental in sabotaging the nuclear development program in Iran around those dates. Infections between 2014 and 2015 seemed to be deployed in connection to the negotiations with Iran regarding its nuclear weapons research. PC security researchers were alarmed when Duqu was used in an attempt to infiltrate the internal network of antivirus companies and PC security firms particularly. These may have started as phishing attacks, although it is still not known what the origin of these attacks may be exactly. One of the motives why it is believed that the initial infection began with a phishing attack is that one suspect for being the initial victim had the contents of his device wiped completely, a tactic often used by malware to hide its activities.

How the Duqu Attack Works on a Targeted Device

Duqu has been linked to a zero-day vulnerability that is powerful and uses an extremely rare technique, which allows the attacker to go into Kernel mode from a Microsoft Word document. This was a technique that was observed in attacks in 2014, which may point to parallel projects or preliminary development. Once access was established with the infected computer or network, the exploit CVE-2014-6324 was used to move throughout the network laterally, allowing external users to gain an administrator account. These privileges can then be used to infect computers throughout the targeted network. These techniques for lateral movement throughout a network were observed in the 2011 version of Duqu infections.

Duqu 2.0 may Be One of the Most Sophisticated Threats Observed to Date

Duqu is capable of using very sophisticated methods to evade detection and removal, residing in memory and not writing files onto the infected device's disk. It also seems that Duqu has different variants, which implement new features throughout the attack. Duqu 2.0 may be using a misappropriated certificate from Foxconn that allows Duqu to maintain its persistence on a device and avoid detection. Duqu also was able to hide its communications with its Command and Control server effectively, using sophisticated techniques to manipulate traffic. The use of misappropriated certificates associated with Duqu and the fact that these certificates have not been linked to other malware threats speaks to the sophistication of the group carrying out this attack since it implies that they managed to hack the owners of these certificates to obtain them for their own use. There are, however, some similarities between Duqu and older version of this threat, including strings in common, nonstandard architecture and the coding style.

File System Details

Duqu may create the following file(s):
# File Name MD5 Detections
1. A0055521.sys f8153747bae8b4ae48837ee17172151e 18
2. 0d8c2bcb575378f6a88d17b5f6ce70e794a264cdc8556c8e812f0b5f9c709198 cc1db5360109de3b857654297d262ca1 9
3. 70f8789b03e38d07584f57581363afa848dd5c3a197f2483c6dfa4f3e7f78b9b 37fc7c5d89f1e5a96f54318df1a2b905 6
4. 63e6b8136058d7a06dfff4034b4ab17a261cdf398e63868a601f77ddd1b32802 1e17d81979271cfa44d471430fe123a5 4
5. 7a32f0e0466ece08d4e5f7acdc5a9d98fe8dd64adbfbdc2d03531b5e06aa2444.exe adb07813f63b4cb52ccd301d80f59e0a 3
6. 52fe506928b0262f10de31e783af8540b6a0b232b15749d647847488acd0e17a.exe 3f52ea949f2bd98f1e6ee4ea1320e80d 1
7. 81cdbe905392155a1ba8b687a02e65d611b60aac938e470a76ef518e8cffd74d.exe c7c647a14cb1b8bc141b089775130834 1
8. Duqu2.exe 92e724291056a5e30eca038ee637a23f 1
9. 8e97c371633d285cd8fc842f4582705052a9409149ee67d97de545030787a192.dll e8eaec1f021a564b82b824af1dbe6c4d 1
10. 09d5b3cf759b6533e7a6bc1ff4998d5db87d24d8ba123b72a9b0021269414744.exe 73a3e4c748e1733746af0fe1052bca4c 0
11. 2c12bb62ed14a01c0cd0d184a502a318b9a3f2ea6d554097130aadb7dc454604.exe fe48930cff3accc6b7dc4dc9a233b992 0
12. 9545afbf2a55af91adc8f9f16e06b2712ea107f7ed14737f203680a66aeef5d1.exe 4bf5feaa30f94e98f8f45295809cbf89 0
13. 2796a119171328e91648a73d95eb297edc220e8768f4bbba5fb7237122a988fc.dll c04724afdb6063b640499b52623f09b5 0
14. 2a9a5afc342cde12c6eb9a91ad29f7afdfd8f0fb17b983dcfddceccfbc17af69.dll acbf2d1f8a419528814b2efa9284ea8b 0
15. 2c9c3ddd4d93e687eb095444cef7668b21636b364bff55de953bdd1df40071da.dll 7699d7e0c7d6b2822992ad485caacb3e 0
16. 2ecb26021d21fcef3d8bba63de0c888499110a2b78e4caa6fa07a2b27d87f71b.dll 84c2e7ff26e6dd500ec007d6d5d2255e 0
17. 3536df7379660d931256b3cf49be810c0d931c3957c464d75e4cba78ba3b92e3.dll 26c48a03a5f3218b4a10f2d3d9420b97 0
18. 5559fcc93eef38a1c22db66a3e0f9e9f026c99e741cc8b1a4980d166f2696188.dll 16ed790940a701c813e0943b5a27c6c1 0
19. 5ba187106567e8d036edd5ddb6763f89774c158d2a571e15d76572d8604c22a0.dll cc68fcc0a4fab798763632f9515b3f92 0
20. 6217cebf11a76c888cc6ae94f54597a877462ed70da49a88589a9197173cc072.dll 966953034b7d7501906d8b4cd3f90f6b 0
21. 6b146e3a59025d7085127b552494e8aaf76450a19c249bfed0b4c09f328e564f.dll 089a14f69a31ea5e9a5b375dc0c46e45 0
22. 6c803aac51038ce308ee085f2cd82a055aaa9ba24d08a19efb2c0fcfde936c34.dll 48fb0166c5e2248b665f480deac9f5e1 0
23. 6de1bb58ae3c37876c6372208366f5548fcc647ffd19ad1d31cebd9069b8a559.dll 520cd9ee4395ee85ccbe073a00649602 0
24. 6e09e1a4f56ea736ff21ad5e188845615b57e1a5168f4bdaebe7ddc634912de9.dll a14a6fb62d7efc114b99138a80b6dc7d 0
25. 9900c91f6d754f15f73729ce5a4333a718463e24aa7e6192c7527ec5c80dac42.dll a6b2ac3ee683be6fbbbab0fa12d88f73 0
26. c16410c49dc40a371be22773f420b7dd3cfd4d8205cf39909ad9a6f26f55718e.dll 10e16e36fe459f6f2899a8cea1303f06 0
27. d12cd9490fd75e192ea053a05e869ed2f3f9748bf1563e6e496e7153fb4e6c98.dll 8783ac3cc0168ebaef9c448fbe7e937f 0
28. d5c57788cf12b020c4083eb228911260b744a2a67c88662c9bab8faebca98fa2.dll 85f5feeed15b75cacb63f9935331cf4e 0
29. d8a849654ab97debaf28ae5b749c3b1ff1812ea49978713853333db48c3972c3.dll a6dcae1c11c0d4dd146937368050f655 0
More files

Related Posts

Trending

Most Viewed

Loading...