πŸ“œ ⬆️ ⬇️

Dump ShadowBrokers: we understand the contents of the directory "swift"

Hello! On Friday, April 14, early in the morning, a new dump of tools and documents of the US National Security Agency appeared in the public access, stolen by TheShadowBrokers APT-grouping. In this article we will try to figure out what is contained in the swift dump folder.



Carefully, under the cut a lot of pictures and text.

Interestingly, this time the group posted a dump on the Steemit service, accompanying the dump with a text about how disappointed they were in US President Donald Trump, and heading it " Lost in translation ". Also interesting is the fact that the dump itself is posted on the Yandex.Disk service. The owner of the file is the user with the nickname yurishitova.
')


This archive was decrypted and uploaded on GitHub .

What is contained in the dump?


The dump consists of three directories: oddjob, swift, windows. Below is a listing of directories.

oddjob
oddjob/
β”œβ”€β”€ Binaries
β”‚ β”œβ”€β”€ oddjob_builder
β”‚ β”‚ β”œβ”€β”€ bin
β”‚ β”‚ β”‚ β”œβ”€β”€ oddjob_v3_x64.dll
β”‚ β”‚ β”‚ β”œβ”€β”€ oddjob_v3_x64.exe
β”‚ β”‚ β”‚ β”œβ”€β”€ oddjob_v3_x86.dll
β”‚ β”‚ β”‚ └── oddjob_v3_x86.exe
β”‚ β”‚ β”œβ”€β”€ builder
β”‚ β”‚ β”‚ └── oddjob_config_v3.exe
β”‚ β”‚ └── ODDJOB_BUilder_v3.hta
β”‚ └── Payloads
β”‚ β”œβ”€β”€ bigpayload.bin
β”‚ β”œβ”€β”€ five_minute_beacon.bin
β”‚ β”œβ”€β”€ greha_dll_x64.dll
β”‚ β”œβ”€β”€ greha_dll_x86.dll
β”‚ β”œβ”€β”€ OJ_Deleter_2.4.exe
β”‚ β”œβ”€β”€ one_byte_payload.bin
β”‚ β”œβ”€β”€ one_minute_beacon.bin
β”‚ β”œβ”€β”€ process_list.bin
β”‚ β”œβ”€β”€ two_minute_beacon.bin
β”‚ └── zero_byte_payload.bin
β”œβ”€β”€ Not-For-Release
β”‚ β”œβ”€β”€ hashes.txt
β”‚ β”œβ”€β”€ oddjob_v3_x64.dllstrings.txt
β”‚ β”œβ”€β”€ oddjob_v3_x64.exestrings.txt
β”‚ β”œβ”€β”€ oddjob_v3_x86.dllstrings.txt
β”‚ └── oddjob_v3_x86.exestrings.txt
β”œβ”€β”€ Testing-Docs
β”‚ β”œβ”€β”€ ODDJOB_Testing.docx
β”‚ └── tungsten_flame.txt
└── User-Docs
β”œβ”€β”€ BITSversions.xlsx
└── How_to_setup_IIS_7_for_ODDJOB.docx

8 directories, 25 files

swift
swift/
β”œβ”€β”€ 00503_0_254.242_2013mar02
β”œβ”€β”€ 00546_0_ensbdasa-09aug2013
β”œβ”€β”€ 00553_0_ensbdpix3-09aug2013
β”œβ”€β”€ 00554_0_ensbdpix4-09aug2013
β”œβ”€β”€ 00555_0_ensbdrtr1-2013aug09
β”œβ”€β”€ 00557_0_ENSBDVPN1-02AUG2013
β”œβ”€β”€ 00558_0_ENSBDVPN2-02AUG2013
β”œβ”€β”€ 00559_0_ENSBDVPN5-02AUG2013
β”œβ”€β”€ 00560_0_ENSBDVPN6-02AUG2013
β”œβ”€β”€ 00562_0_ENSBDSW01-02AUG2013
β”œβ”€β”€ 00563_0_ENSBDSW02-02AUG2013
β”œβ”€β”€ 00566_0_ENSBPVPN1.txt
β”œβ”€β”€ 00566_1_ENSBPVPN2.txt
β”œβ”€β”€ 00566_2_FW1-Configuration.txt
β”œβ”€β”€ 00566_3_SW1-Configuration.txt
β”œβ”€β”€ 00566_4_SW2-Configuration.txt
β”œβ”€β”€ 00679_0_ENSBDVPN1-23AUG2013
β”œβ”€β”€ 00687_0_ENSBDVPN2-23AUG2013
β”œβ”€β”€ 00697_0_ENSBDVPN5-23AUG2013
β”œβ”€β”€ 00702_0_ENSBDVPN6-23AUG2013
β”œβ”€β”€ 00703_0_ensbdsslvpn1-system-2013aug15.cfg
β”œβ”€β”€ 00705_0_254.229-2013sep06.txt
β”œβ”€β”€ 00708_0_ensbdasa1-31aug2013
β”œβ”€β”€ 00710_0_ensbdfw1-2013sep06
β”œβ”€β”€ 00711_0_ensbdfw3-2013sep06
β”œβ”€β”€ 00713_0_ensbdfw4-2013sep06
β”œβ”€β”€ 00715_0_ensbdfw5-2013sep06
β”œβ”€β”€ 00720_0_ensbdpix3-31aug2013
β”œβ”€β”€ 00725_0_ensbdpix4-31aug2013
β”œβ”€β”€ 00727_0_ensbdpix5-31aug2013
β”œβ”€β”€ 00729_0_ensbdrtr1-2013sep06
β”œβ”€β”€ 00734_0_ensbdsslvpn1-user-2013aug15.cfg
β”œβ”€β”€ DNS Zone Trans 2013_10_11.txt
β”œβ”€β”€ DNS Zone Trans 2013_10_17.txt
β”œβ”€β”€ DSL1opnotes.txt
β”œβ”€β”€ DSL2opnotes.txt
β”œβ”€β”€ DSquery Belgium DC.xlsx
β”œβ”€β”€ dsquery_Query_computers_from_MAIL001.txt
β”œβ”€β”€ DSquey Dubai enDCBACKUP.xlsx
β”œβ”€β”€ DSquey Egypt DC.xlsx
β”œβ”€β”€ DSquey END boxes and MX servers.xlsx
β”œβ”€β”€ DSqueyMain.xlsx
β”œβ”€β”€ Eastnets_Huge_Map_05_13_2010.vsd
β”œβ”€β”€ Eastnets_UAE_BE_Dec2010.vsd
β”œβ”€β”€ Employee.txt
β”œβ”€β”€ ~$$EN_DUBAI_ASA.~vsd
β”œβ”€β”€ EN_DUBAI_ASA.vsd
β”œβ”€β”€ EN_DUBAI_MAIN.vsd
β”œβ”€β”€ EN Production net 01 AUG 2013_kdmoore.xlsx
β”œβ”€β”€ EN Production net 01 AUG 2013.xlsx
β”œβ”€β”€ ENSBDSSL1-2013SEP27.xml
β”œβ”€β”€ ENSB DXB Passwords V2.4.xlsx
β”œβ”€β”€ ENSBJVPN1_cfg.txt
β”œβ”€β”€ ENSB UAE NW Topology V2.0.1339670413.vsd
β”œβ”€β”€ FATags.txt
β”œβ”€β”€ Important NOTES.txt
β”œβ”€β”€ initial_oracle_exploit.sql
β”œβ”€β”€ JEEPFLEA_MARKET_BE.xls
β”œβ”€β”€ JEEPFLEA_MARKET Implants.xlsx
β”œβ”€β”€ JEEPFLEA_MARKET Passwords V2.4.xlsx
β”œβ”€β”€ JEEPFLEA_MARKET_UAE.xlsx
β”œβ”€β”€ JF_M FIN Exfil.vsd
β”œβ”€β”€ JFM_Status.pptx
β”œβ”€β”€ Legend.pptx
β”œβ”€β”€ list_of_saa_servers_8May2013.xlsx
β”œβ”€β”€ NOC_firewall_passwords_30May2013.txt
β”œβ”€β”€ Production.txt
β”œβ”€β”€ ~$SB JO passwords V 2.docx
β”œβ”€β”€ swift_msg_queries_all.sql
└── VPNFW_Plan.txt

0 directories, 70 files

The windows directory contains a large number of files, I suggest the reader to familiarize themselves with it by following the link above to github. I will only clarify that this directory contains frameworks for exploitation, exploits and implants used by the NSA for penetration. If there is interest in this topic, a continuation of the article with analysis of the windows folder and its contents will be published.

swift


In the process of studying the contents of the directory, the impression is that this is a common project folder where employees put their work and project documentation (judging by the code in the scripts from the windows directory, it is assumed that this folder is automatically mounted to the specialist machine). According to the latest dates from various files, it can be assumed that the content was stolen in September 2013, when the project was still in the status of fully boiling work. Based on text and office files, it can be concluded that the EastNets organization, which is associated with the development of financial software and SWIFT, was attacked.

Description EastNets from SWIFT website
EastNets Group is an international company specializing in creating software for financial organizations. Since its foundation, EastNets has been cooperating closely with the participating companies, solutions and technological platforms development.

It has been established that it has been established as a security policy.

EastNets Group offices are located in Brussels, Paris, New York, Los Angeles, Madrid, Hague and Luxembourg. With other regions, the company is working through business partners' network. Alliance Factors

EastNets solutions users are the largest banks, including ING Bank, ABN Amro Bank, Bank of China, Credit Lyonnais Bank, Raiffeisen Bank, Hypovereinsbank, Nordea Group, Fortis Bank and many others.

The following files are network equipment configurations, namely:

Cisco PIX
00553_0_ensbdpix3-09aug2013
00554_0_ensbdpix4-09aug2013
00711_0_ensbdfw3-2013sep06
00713_0_ensbdfw4-2013sep06
00715_0_ensbdfw5-2013sep06
00720_0_ensbdpix3-31aug2013
00725_0_ensbdpix4-31aug2013
00727_0_ensbdpix5-31aug2013


Cisco ASA
00546_0_ensbdasa-09aug2013
00566_2_FW1-Configuration
00708_0_ensbdasa1-31aug2013
00710_0_ensbdfw1-2013sep06


Cisco Router
00555_0_ensbdrtr1-2013aug09
00729_0_ensbdrtr1-2013sep06


Cisco switch
00562_0_ENSBDSW01-02AUG2013
00563_0_ENSBDSW02-02AUG2013
00566_3_SW1-Configuration
00566_4_SW2-Configuration


Juniper equipment
00503_0_254.242_2013mar02
00557_0_ENSBDVPN1-02AUG2013
00558_0_ENSBDVPN2-02AUG2013
00559_0_ENSBDVPN5-02AUG2013
00560_0_ENSBDVPN6-02AUG2013
00679_0_ENSBDVPN1-23AUG2013
00687_0_ENSBDVPN2-23AUG2013
00697_0_ENSBDVPN5-23AUG2013
00702_0_ENSBDVPN6-23AUG2013
00705_0_254.229-2013sep06


The directory contains, among others, Microsoft Office files, some of which are password-protected, brute-force from known dictionaries did not produce a result:

Files: ENSB DXB Passwords V2.4.xlsx, JEEPFLEA_MARKET Passwords V2.4.xlsx

There is also a presentation, created, apparently, for a report on the current status of the project. The presentation, judging by the metadata, was created on July 1, 2013, the latest changes were made on August 12, 2013. It can be suggested that a report took place around this date.
File: JFM_Status.pptx



The third page of the presentation tells us about a certain JEEPFLEA_POWDER, which is no longer mentioned in the archives. It can be assumed that this project is called JEEPFLEA and is divided into stages, of which only MARKET and POWDER are mentioned. Further in the article I will use this conditional division.



Let us dwell on this in more detail.

First slide


This slide says a lot about the project as a whole. stage JEEPFLEA_MARKET.

Goal stage : EastNets offices in Dubai, Belgium and Egypt.

Obtained at this stage : 9 SAAs - may refer to the external systems of the company. Admins - admin access to internal systems can be kept in mind.
It is not known what Quad means in the presentation.

The slide says that access to the customer network (employee network) was obtained, and the installation of the ZESTYLEAK tool on the company's VPN firewalls is also planned. Based on open sources, ZESTYLEAK is an implant that is part of FEEDTROUGH, developed by the NSA for installation on Juniper brand network equipment. The mention of this software is in the ANT catalog (documents published by Edward Snowden):



Third slide


The third slide of the presentation tells about the plans of the JEEPFLEA_POWDER stage, at the time of editing the presentation, the NSA has no particular success.

Purpose of the stage : BCG subsidiaries in Venezuela and Panama. Business Computer Group is an EastNets reseller in Venezuela and Panama.

Description BCG from the site EastNets
http://www.eastnets.com/Partners/Business_Resellers/Americas_copy1.aspx
Founded in 1994, BCG Business Computer Group is all strategic of EastNets for Latin America. Based on the Pacific Ocean Coast, the BCG has been proudly renowned in EastNets. Our customers enjoy the comprehensive suite of products, such as SafeWatch Filtering, SafeWatch Profiling, Reporting, among others in the region.
Additionally, taking advantage of the BCG's Service Bureau of Real Estate of the SWIFT, there has been a list of small businesses that have been approved at competitive prices.
Join to EastNets / BCG
Geographical Coverage
Panama, Venezuela & the whole of Latin America except Brazil

Plans for the stage : work is under way on the compromise of the administrators' machines using the SECONDDATE and IRONVIPER implants.

SECONDDATE - an implant for performing man-in-the-middle attacks using web protocols.

A description of the documents published by Snowden is available .

Apparently, the implant may be some kind of BeEF framework.

Continue to examine the contents of the directory swift .

Many tables have the following interesting columns:




The directory also contains a set of tables with the results of queries to the domain controllers of the corporate network EastNets, which contain information about the host names, the installed OS and service packs, the names and surnames of employees, and so on. Service information.



The directory contains files similar to project notes, namely:


Office Documents


Some files were clearly created in EastNets itself and contain the corresponding corporate tagging, while the other part of the file was created directly by the NSA, as indicated by the tagging with the name JEEPFLEA_MARKET. Metadata is found in several of these files, where the authors of the documents are disclosed, as well as the time for creating and modifying documents. Based on this data, the first document was created on September 1, 2011:



The NSA-FTS327 tag can indicate that Pecoraro Michael’s employee belongs to the Requirements & Targeting division, which in turn is included in Tailored Access Operations (FTS32 - TAO).

The latest changes to the JEEPFLEA_MARKET_BE.xls file (information on the EastNets division in Belgium) were made by a certain Heidbreder Nathan S SSG NSA-F22.

The NSA-F22 tag can talk about the employee’s belonging to the F22 division: European Cryptologic Center (ECC), Germany.

LinkedIn registered on the social network an account that coincides with the signs on the employee in question: nathan heidbreder, the specialty is listed as β€œCryptologic Network Warfare Specialist at US Army”. Link



A Twitter search also gave a result: a probable twitter account of this person, registered in 2014, was found. Twitter is empty and clearly used only to read the stream of tweets from subscriptions. According to the subscriptions of this twitter, we can assume that this twitter account is the account of this person.

Screenshot of twitter.com/NHeidbreder :



Twitter user subscriptions:



Screenshot of the nedan heidbreder page in Linkedin:



In the process of writing this article, the accounts on Linkedin and Twitter were deleted, but the screenshots are still there.

A request to Google for the keywords "nathan heidbreder us army" leads to corpsman.com , where Heidbreder Nathan Scott appears on the list.

An interesting detail: Austin Hurlock Twitter was the only @NHeidbreder account subscriber on twitter and an account from which the β€œsecurity” competence of the nathan heidbreder account in Linkedin was verified.

At the time of this writing, the Austin Hurlock account was available on Linkedin. At the time of creating the files for the JEEPFLEA project, this person worked as a Computer Network Defense Analyst in Marine Corps:




SQL


Among other things, the directory contains files with Oracle SQL commands for extracting information of interest to the NSA, I will give a few examples ( File initial_oracle_exploit.sql ):

 select '"name","account_status","password","spare4"' from dual; select '"'||name||'","'||account_status||'","'||u.password||'","'||spare4||'"' from user$ u, dba_users where spare4 is not null and username = name; 

 select '"SWIFT_Dates_In_Database"' from dual; select substr(table_name,6,20) SWIFT_Dates_In_Database from all_tables where owner = 'SAAOWNER' and table_name like 'MESG%' and table_name not like '%YYYYMMDD%' order by 1 desc 

Conclusion


I am sure that the specialists in forsensica and OSINT, which I am not, will be able to conduct a deeper analysis of the files in this directory. At the moment there is no possibility to confidently assert that all of the above events and the alleged performers really existed. Unambiguous evidence of the authenticity of the files laid out does not exist. In addition, it is difficult to conclude whether these people have anything to do with the announced operations of the US special services.

I suggest Habrayuzer to participate in discussion in the comments.

Andrey Rogozhkin

UPD: Colleagues suggested that the abbreviation SAA could mean Swift Alliance Access , a client-side messaging system. Those. Perhaps during the project, 9 SAA have been compromised by EastNets customers .

Source: https://habr.com/ru/post/327114/


All Articles