ComputraceÊÇ·ÇÒ»Ï߼䣬×éºÏÍþв½¥ÏÖ½ºþ
2019-06-05
1ÒòÓÉ
1ÒòÓÉ
¿ËÈÕ£¬¡¶¹ØÓÚAbsolute¹«Ë¾·ÀµÁ×·×ÙÈí¼þÇ徲Σº¦µÄÌáÐÑ¡·µÄÎÄÕÂÔÚ»¥ÁªÍøÉϹãΪÈö²¥£¬ÒýÆðÁ˹«¹²¶Ô¸ÃÈí¼þµÄÌÖÂÛ£¬ÆäÖÐÎÄÕÂËùÖ¸¾ÍÊÇÓÉAbsolute¹«Ë¾¿ª·¢µÄ·ÀµÁ×·×ÙÈí¼þLoJack for LaptopsÒ²³Æ×÷Computrace£¬¸ÃÈí¼þ°üÀ¨Ô¶³ÌËø¶¨£¬É¾³ýÎļþÒÔ¼°ÔÚµØÍ¼ÉÏÕÒµ½±»µÁÌõ¼Ç±¾µçÄԵĹ¦Ð§¡£×ÅʵÔçÔÚ2009Äê×îÏÈComputraceµÄÇå¾²ÎÊÌâ¾ÍÒѾ̻¶ÔÚ¹«¹²µÄÊÓÒ°Ö®ÖУ¬ÏÖÔÚÈÃÎÒÃÇÍù·µÊ×Ò»ÏÂÕû¸öÊÂÎñ¡£
ͼ1ÊÂÎñʱ¼äÏß
´ÓÉÏͼ¿ÉÒÔ¿´³öÕû¸öÊÂÎñºá¿çÊ®Ä꣬¿ÉνÀúʱ¾ÃÔ¶£¬²¢ÇÒ¶à´ÎÔÚ¹ú¼ÊÇå¾²¾Û»áÖб»Ìá¼°£¬ÕâҲ˵Ã÷ÎúComputraceÈí¼þ±£´æ×ÅÑÏÖØÇ徲Σº¦£¬ÊÇÇå¾²ÁìÓò¹Ø×¢µÄÖØµãÖ®Ò»¡£½üÄ걨¸æÏÔʾ£¬´ËÈí¼þÒÉΪ±»APT28×é֯ʹÓ㬳ÉΪÆä¾ÙÐÐAPT¹¥»÷µÄÀûÆ÷£¬±¬·¢ÑÏÖØÒþ»¼¡£
ÈÃÎÒÃÇÀ´Ï¸ÊýComputraceÈí¼þ±£´æµÄÒþ»¼£¬ÒÔ¼°±£´æµÄ¹¥»÷Ãæ¡£
2Íþв¹¥»÷ÃæÆÊÎö
2.1 ComputraceÊÂÇéÔÀí
ƾ֤2014ÄêBlackHatÐû²¼µÄÑо¿Ð§¹ûÏÔʾ£¬Computrace±£´æÓÚÅÌËã»úµÄBIOSµÄROMÖУ¬Æä¹¦Ð§ÊÇ·ñ¼¤»îÔÚBIOSÇ徲ѡÏîÖпÉÒÔÉèÖ᣼¤»î״̬ϵÄComputraceµÄÊÂÇéÁ÷³Ì¿ÉÒÔ·ÖΪËĸö½×¶Î:
µÚÒ»½×¶Î£¬Computrace±£´æÓÚBIOSÆô¶¯Àú³ÌÖУ¬Computrace»áÔÚÎļþϵͳÖвéÕÒautocheck.exeÎļþ²¢±¸·ÝÐ޸쬻òÕßÐÞ¸ÄÐÞ¸ÄÓ²ÅÌÇý¶¯Æ÷µÄMBR£¬ÔÚϵͳÆô¶¯µÄ×î³õ½×¶Î¿ØÖƵçÄÔ£»
µÚ¶þ½×¶Î£¬Í¨¹ýWindows NT ÍâµØ½Ó¿Ú»á¼ûÎļþϵͳɾ³ýrpcnetp.exe£¬½¨ÉèÃûΪrpcnetpµÄзþÎñ²¢ÐÞ¸Ä×¢²á±í£¬×îºó»Ö¸´autocheck.exe£»
µÚÈý½×¶Î£¬rpcnetp.exeÒÔ·þÎñ·½·¨Æô¶¯£¬ÐÞ¸Ä×ÔÉíΪdllÎļþ£¬²¢¼ÓÔØµ½Äڴ棬½¨Éè×ÓÀú³Ìsvchost.exe²¢¹ÒÆð£¬²¢½«dll×¢Èëµ½¸ÃÀú³Ì¡£µ±svchostÀú³Ì»Ö¸´Ê±£¬½«½¨ÉèеÄ×ÓÀú³Ìiexplore.exeÒ²¹ÒÆð£¬Í¬Ñù½«dllµÄ×¢Èëµ½¸ÃÀú³Ì£¬¸ÃÀú³Ì»Ö¸´ºó£¬»áÅþÁ¬·þÎñ¶Ë»ñȡеÄÏÂÁîºÍÏÂÔØ¼ÓÃÜÄ£¿éwceprv.dll¡¢Éý¼¶Ä£¿éupgr.exe¡¢Ö÷Ä£¿érpcnet.exeÒÔ¼°ÆäËüÄ£¿éidentprv.dll¡£×îºóɾ³ý֮ǰµÄÉÏÒ»½×¶Î½¨ÉèµÄ·þÎñºÍrpcnetp.exeÎļþ£¬²¢Îªrpcnet.exe×¢²áºÍÆô¶¯Ò»¸öзþÎñ£»
µÚËĽ׶Σ¬rpcnetÒÔ·þÎñ·½·¨Æô¶¯»áͨ¹ý½¨ÉèsvchostÀú³ÌµÈÓëÉÏÒ»½×¶ÎÀàËÆµÄ·½·¨ÅþÁ¬·þÎñ¶Ë£¬È»ºó¸Ã·þÎñ»áÔÚ×¢²á±í£¬ÎļþϵͳºÍ×ÔÉíµÈλÖòéÕÒÉèÖã¬Í¨¹ýÉèÖÃÅþÁ¬Ô¶³Ì·þÎñ¶Ë£¬¶Ô·þÎñ¶ËÌṩ¿ÉÀ©Õ¹µÄÔ¶³Ì»á¼û¡£
2.2 Computrace±£´æµÄÒþ»¼
1. BIOS³£×¤
ƾ֤ÉÏÃæÏÈÈÝÎÒÃÇÖªµÀComputraceÊDZ£´æÓÚÅÌËã»úµÄBIOSÖ®ÖУ¬ÕâÊÇÓÉÓ²¼þ¹©Ó¦ÉÌÖ±½ÓдÈëµÄ£¬±£´æÓÚÓ²¼þÖ®ÖС£Òò´ËComputrace¿ÉÒÔÔÚ²Ù×÷ϵͳÖг¤´æ£¬¼´Ìæ»»Ó²ÅÌ»ò¸üÐÂÖØÖòÙ×÷ϵͳÒÀÈ»¿ÉÒÔ¼ÌÐø±£´æ¡£
2. Ò»Á¬ÐÅÏ¢´«Êä
ComputraceĬÈÏÉèÖÿªÊ±»úÅþÁ¬Ò»´Î·þÎñ¶Ë£¬Ö®ºóÔÚ¿ª»úÇéÐÎÏÂÿ24Сʱ»áÅþÁ¬Ò»´Î£¬³ý·ÇÔÚ·þÎñ¶ËÉÏÐÞ¸ÄÕâ¸öµÄÉèÖá£
3. δÊÚȨ¼¤»î
ƾ֤2014Ä꿨°Í˹»ùͳ¼ÆµÄÐÅÏ¢£¬¼¤»î״̬µÄComputraceÁè¼Ý200Íò£¬¼¤»î״̬µÄComputraceÁýÕÖÁ˴󲿷ֵĵçÄÔÆ·Åƹ©Ó¦ÉÌ¡£ÆäÖÐһЩµçÄÔÆ·Åƹ©Ó¦É̵ÄBIOSÇ徲ѡÏîÖеÄComputrace´¦ÓÚĬÈϼ¤»î״̬»òÕß±£´æÎ´ÊÚȨ¼¤»îµÄÇéÐΡ£BIOSÖеÄÉèÖÃÑ¡ÏîÖ»ÓÐÒ»´Î¸Ä±äµÄʱ»ú£¬¸ü¸Äºó½«ÎÞ·¨Ôٴθü¸Ä¡£
2.3 ¿É±»Ê¹ÓõĹ¥»÷Ãæ
Computrace³ýÁËÉÏÊö×ÔÉí±£´æµÄÒþ»¼Ö®Í⣬ÉÐÓб£´æ×ſɱ»Ê¹ÓõĹ¥»÷Ãæ£¬ÕâЩÇå¾²Òþ»¼ÔÚÒ»Ð©ÌØÊⳡ¾°ÖÐͨ¹ýÇÉÃîµÄ×éºÏʹÓã¬Ò²»á±¬·¢ÖØ´óµÄÇå¾²Íþв£º
ÔÚoffensivecon19´ó»á£¬ÍâÑóÑо¿Ö°Ô±akendoµÄÑо¿Ð§¹ûÅú×¢£¬Ä³Æ·ÅƵçÄÔÉÏComputrace²»¿É±»ÓÀÊÀ½ûÓá£ÔÚ¸ÃÆ·ÅƵĵçÄÔÉÏ£¬±£´æÒ»¸öÃûΪSecurityConfigsµÄ½á¹¹Ì壬ÄÚÀïÉúÑÄ×ÅÆäµÄÏà¹ØÇå¾²ÉèÖÃÕâЩÉèÖðüÀ¨ComputraceµÄ¼¤»îÓë½ûÓõÈÉèÖá£Í¬Ê±¸ÃÆ·ÅÆ±£´æÒ»¸ö ComputraceSmiServiceµÄSMI£¨System management interrupts£©·þÎñ£¬Í¨¹ý´Ë·þÎñµÄ»Øµ÷º¯Êý¾Í¿ÉÒԸıä Security ConfigsÖеÄÉèÖÃÐÅÏ¢£¬´Ó¶ø¸Ä±äComputraceµÄ¼¤»î״̬¡£ËäÈ»´Ë¹¦Ð§±£´æÃÜÂë±£»¤»úÖÆ£¬µ«Ôڴ˹¦Ð§ÖÐʹÓõÄÃÜÔ¿ÊÇËĸö×Ö½Ú£¬¶øÕâËĸö×Ö½Ú½ÓÄÉÑ»·½ÏÁ¿µÄ·½·¨¾ÙÐÐÃÜÔ¿ÑéÖ¤£¬¿ÉÒÔÆ¾Ö¤×Ö½Ú¾ÙÐб¬ÆÆ£¬¿ÉÒԺܿìµÄÍê³ÉÆÆ½â¡£
µ±¹¥»÷Õß»ñµÃ¸ÃÆ·ÅÆµçÄÔµÄÍâµØÖ´ÐÐȨÏÞʱ£¬Í¨¹ýÉÏÊöÒªÁ죬¿ÉÒÔÈ·±£¸ÃÆ·ÅÆµçÄÔµÄComputraceÒ»Ö±´¦ÓÚ¼¤»î״̬¡£Ö»¹ÜAbsolute¹«Ë¾¾Í¼¤»î״̬ÎÊÌâÔø¶à´Î½ÒÏþÉùÃ÷³Æ´ËÈí¼þÊDz»±£´æÇå¾²ÎÊÌâµÄ£¬¿ÉÊǹØÓÚ¸ÃÆ·ÅƵĵçÄÔ£¬´ËÎÊÌâÒÀ¾É±£´æ¡£
2. ±»¡°°×Ãûµ¥¡±
Core Security TechnologiesºÍ¿¨°Í˹»ùµÄÑо¿Ô±½ÒÏþµÄÑо¿Ð§¹ûÖÐÏêϸµÄÏÈÈÝÁËComputraceµÄÊÂÇé»úÖÆ¡£×÷Ϊһ¿îÕýµ±µÄ×·×Ù·ÀµÁÈí¼þ£¬Ö»¹Ü±£´æÖîÈç×¢ÈëÆäËûÀú³ÌµÄÄڴ棬½¨ÉèÉñÃØÍ¨Ñ¶µÈ¶ñÒâÈí¼þ³£ÓõÄÊÖÒÕ£¬¿ÉÊÇ΢ÈíϵͳºÍÖÚ¶àɱ¶¾Èí¼þ¹©Ó¦É̶¼²î³ØAbsolute¹«Ë¾µÄComputraceÄ£¿éµÄ¼ì²â£¬¶øÊǽö½ö½«Æä±ê¼ÇΪ²»Çå¾²£¬¶ø²»ÊDZê¼Ç¶ñÒâÈí¼þ¡£
3. Êý¾ÝÃ÷ÎÄ´«Êä
ͬÑùÔÚ2014 BlackHatÖУ¬ÍâÑóÑо¿Ö°Ô±ÏÈÈÝÁË2008°æComputraceµÄÁ÷Á¿ÐÒéÃûÌá£ÆäÖÐÁ÷Á¿½ÓÄÉÃ÷ÎÄ´«Ê䣬ûÓÐʹÓÃÈκεļÓÃÜËã·¨£¬Ö»Ê¹ÓüòÆÓµÄУÑéËã·¨¶ÔÊý¾ÝµÄÍêÕûÐÔ¾ÙÐмòÆÓµÄУÑ飬¶øÐ£ÑéµÄËã·¨Ò²Ò»²¢¹ûÕæ¡£Òò´Ëͨ¹ý¹ûÕæµÄÐÒéÃûÌÃαÔì´«ÊäÊý¾ÝºÍУÑéÖµ£¬µÖ´ï¸Ä¶¯Í¨Ñ¶ÄÚÈÝÄ¿µÄ£¬ÕâΪÖÐÐÄÈ˹¥»÷ÌṩÁË»ù´¡¡£
4. ÉèÖÿɱ»¸Ä¶¯
ƾ֤ÉÏÊöÏÈÈݵÄÊÂÇéÁ÷³Ì£¬ÎÒÃÇ¿ÉÒÔÖªµÀComputrace»áÔÚ×¢²á±í£¬ÎļþϵͳºÍ³ÌÐò×ÔÉíѰÕÒÉèÖÃÐÅÏ¢£¬Í¨¹ýÉèÖÃÐÅÏ¢Öд洢µÄ·þÎñ¶ËÓòÃûÐÅÏ¢£¬À´ÅþÁ¬·þÎñ¶Ë¡£¶øÉèÖÃÖзþÎñ¶ËµÄÉèÖÃÐÅÏ¢ÊǽÓÄÉÒ»¸ö×Ö½Ú×÷ΪÃÜÔ¿µÄÒì»ò¼ÓÃÜËã·¨¾ÙÐмÓÃÜ£¬Òò´Ë¹¥»÷Õß¿ÉÒÔºÜÈÝÒ×µÄÆÆ½â²¢Ìæ»»ÉèÖÃÖеÄÓòÃûÐÅÏ¢£¬½«·þÎñ¶ËµÄµØµãÐÞ¸ÄÖ¸Ïò¹¥»÷ÕßËù¿ØÖƵķþÎñÆ÷£¬¹¥»÷Õ߾ͿÉÒÔºÜÈÝÒ׵ĿØÖÆÊܺ¦ÕߵĵçÄÔ£¬´Ó¶øÖ´ÐÐí§Òâ´úÂë¡£
ÓÉÓÚComputraceÈí¼þÔÚÅÌËã»úµÄBIOSÉϱ£´æÎ´ÊÚȨ¼¤»î»ò²»¿É±»ÓÀÊÀ½ûÓã¬ÇÒÓÐ×Å×ÔÈ»µÄ¡°°×Ãûµ¥¡±ºÍ±£´æÖÐÐÄÈ˹¥»÷µÄ»ù´¡£¬Òò´ËComputraceµÄÇå¾²ÎÊÌâ¿ÉÒÔ½«ÓÐÓõŤ¾ßÄð³ÉÍøÂç·¸·¨·Ö×ÓµÄÓÐÁ¦ÎäÆ÷£¬²¢ÇÒºã¾ÃʹÓöø²»Ò×±»¼ì²âºÍ²ì¾õ¡£
3ºË²é
1. ͨ¹ýBIOSºË²é£º
DellÆ·ÅÆÅÌËã»úÖØÆôºó°´F2¼´¿É¼ÆÈëBIOS£¬µã¿ª×ó±ßSerurityÑ¡ÏÉó²éÆä×ÓÑ¡ÏîComputrace£¬ÈôÊÇÑ¡ÏîΪActivateÔòÌåÏÖCompurtaceÒѾ±»¼¤»î£¬DeactiveÌåÏÖδ¼¤»î£¬Disable±íÊǽûÓá£ÆäËüÆ·ÅÆÇëÔÚÅÌËã»úBIOS²Ëµ¥ÖÐÖðһɸ²é¡£
ͼ2 Dell Inspiron 7560 BIOSÑ¡Ïî(ĬÈÏδ¼¤»î)
2. Àú³ÌºË²é£º
ÅŲéÊÇ·ñ±£´ærpcnet.exe¡¢rpcnetp.exe¡¢rpcnet.dll¡¢rpcnetp.dllµÈÏà¹ØÀú³Ì£¬ÈôÊDZ£´æÔò˵Ã÷¸ÃÈí¼þÕýÔÚÔËÐС£
4Çå¾²½¨Òé
1. ¼Æ»®Ò»£¬Õ¥È¡Èí¼þÔËÐÐ
µÚÒ»²½£º·¿ª×¢²á±í±à¼Æ÷£¬Ç붨λµ½£º
HKEY_LOCAL_MACHINESYSTEMCurrentControlSetControlSession Manager
½«ÓÒ±ßµÄ BootExecute ¼üÖµ£¨ÏµÍ³Ä¬ÒÔΪautocheck autochk *£©±¸·Ýºóɾ³ýµô£¬×èÖ¹¸Ã³ÌÐò×Ô¶¯ÔÙÆô¶¯ºóÐøÀú³Ì¡£
µÚ¶þ²½£ºÔÚʹÃüÖÎÀíÆ÷Öп¢ÊÂÏà¹ØÀú³Ì£¬É¾³ýSystem32Ŀ¼ÏµÄÎļþrpcnet.exe¡¢rpcnetp.exe¡¢rpcnet.dll¡¢rpcnetp.dll£¬´ËʱÇÐÎðÖØÐÂÆô¶¯Windows¡£
µÚÈý²½£ºÔÚSystem32Ŀ¼Ï»®·Öн¨ÒÔÉÏËĸöÎļþ£¬ÎļþÄÚÈÝΪ¿Õ£¬ÎªÃ¿¸öÎļþÖ´ÐÐÈçϲÙ×÷£ºÓÒ¼üµ¥»÷£¬·¿ªÊôÐÔÒ³£¬Çл»µ½¡°Çå¾²¡±Ñ¡Ï£¬ÎªÁгöµÄÿ¸öÓû§»ò×飨°üÀ¨SYSTEM£©ÉèÖÃΪ¾Ü¾ø¡°ÍêÈ«¿ØÖÆ¡±¡£
2. ¼Æ»®¶þ£¬Õ¥È¡¸ÃÈí¼þ»á¼ûÍøÂç
ÐÞ¸ÄhostÎļþ£¬½«Ïà¹ØÓòÃûÉèÖÃΪեȡ»á¼û£º¼Çʱ¾·¿ªC:WindowsSystem32driversetchostsÎļþ£¬Ä©ÐÐÊäÈëÒÔÏÂÐÅÏ¢ºóÉúÑÄ¡£
127.0.0.1 search.namequery.com
127.0.0.1 search.namequery.com
127.0.0.1 search2.namequery.com
127.0.0.1 search64.namequery.com
127.0.0.1 search.us.namequery.com
127.0.0.1 bh.namequery.com
127.0.0.1 namequery.nettrace.co.za
127.0.0.1 m229.absolute.com
²¢ÔÚ·À»ðǽÈí¼þÖÐÉèÖý«rpcnet.exe¡¢rpcnetp.exe եȡ»á¼ûÍøÂç¡£
3. ¼Æ»®Èý£º¶ÔÓ¦¼¯ÍÅÓû§¿ÉÒÔÔÚ·À»ðǽ»òDNS·þÎñÆ÷ÉÏÆÁÕÏÓòÃû¡£
4. ÆäËü¼Æ»®£º
³ýÁËÉÏÊöͨÀý½â¾ö¼Æ»®Õ¥È¡Èí¼þÔËÐлò×èµ²ÍøÂçÇëÇóÖ®Í⣬ÕâÀﻹÌá³öһЩÆäËüµÄ½â¾ö¼Æ»®£º
A) Ìæ»»²Ù×÷ϵͳΪlinux¿¯Ðаæ
B) ´òµç»°¸øAbusolute¿Í·þ
5×ܽá
×ÛÉÏ£¬´Ë´ÎÊÂÎñÖÐÌáµ½µÄComputraceÖ÷ÒªÊÇÆäÀúÊ·2008°æ±¾Öб£´æÇå¾²ÎÊÌâºÍÒþ»¼£¬Ö÷ÒªÊDzο¼Ê¹ÓÃ2014Äêblackhat´ó»áÉÏÑݽ²ËùÌáµ½µÄÑо¿Ð§¹û£¬Ð°汾ÔÝδ·¢Ã÷еÄÎó²îÇå¾²Íþв¡£
ÍøÂçÇå¾²ÍþвDZÔÚÓÚÎÒÃÇÒ»Ñùƽ³£ÉúÑÄÖеÄÐí¶à»·½Ú£¬²î±ðÓÚ¹ãΪ¹Ø×¢µÄ0day£¬AbusoluteÈí¼þ¾ß±¸µÄ°×ʹÓÃÌØÕ÷£¬±£´æ¿ÉÄÜÐ®ÖÆµÄÌõ¼þ£¬Õâ¾ÍÏñÒ»¸ö×ÔÈ»±£´æµÄºóÃÅ£¬ÕâÀà·Ç0day×éºÏÍþвÍùÍù±»ÈËËùºöÊÓ£¬¶øÕ⼫ÓпÉÄÜÊÇδÀ´Íþв²¶»ñÓë·¢Ã÷µÄÖØµãÖ®Ò»¡£
6²Î¿¼
https://www.blackhat.com/docs/us-14/materials/us-14-Kamluk-Computrace-Backdoor-Revisited-WP.pdf
https://securelist.com/absolute-computrace-revisited/58278/
https://www.absolute.com/en/resources/faq/absolute-response-to-arbor-research
https://www.blackhat.com/presentations/bh-usa-09/ORTEGA/BHUSA09-Ortega-DeactivateRootkit-PAPER.pdf
http://itsecchina.com/web/xxk/ldxqById.tag?CNNVD=CNNVD-201805-407
http://news.kaspersky.com.cn/news2014/02n/140212.htm
https://www.netscout.com/blog/asert/lojack-becomes-double-agent
https://www.absolute.com/en/about/pressroom/press-releases/2009/absolute-refutes-claims-of-bios-vulnerability

¾ÅÓÎÀϸçÔÆ







