Researchers at G DATA - have examined a new spyware which still seems to be in a development stage. But what is it about and what are its objectives?
The new espionage tool which was was christened "Rurktar" allows some conclusions as to its origin. It is very likely that it originates from Russia. There is quite some evidence to support this: some of the internal error messages of Rurktar are in Russian. Also, the IP addresses used for remote control of the spyware are located in Russia.
It is not 100 per cent clear whether Rurktar is the work of a single individual or a development team. What we can say, though, is that a Dropbox folder is used as a working directory. There are several possible reasons for this. One of them is that several developers are cooperating here and consolidate their work through a Dropbox. What Dropbox can also be used for by a single individual is a crude and very basic versioning system - some Dropbox accounts offer the possibility of restoring earlier versions of a file. Therefore, it can be used to track changes, but it is not ideal from a developer's stand point. Using Dropbox as a backup is, of course, also a possibility to be considered here.
Although not all of the functions are omplemented yet, it is relatively safe to say that Rurktar is intended for use in targeted spying operations. The functions that are already implemented allow reconnaissance of a network infrastructure, they can check whether or not a particular machine is reachable, take screen shots and even download specific files from an infected machine. It is also possible to delete files from or upload files to a machine. All of this points to industrial espionage - the functions that have been described so far do not have any practical application for large-scale operations, such as ransomware schemes.
As the spyware is still in a development state and not operational yet, it has not spread very widely.
Those few IP addresses that have been linked to Rurktar so far could just as well only have been used for testing purposes by the developer(s). This, however, can and will change as development work progresses. The IP addresses used for remote controlling Rurktar will see more diversity and not only be confined to Russia but to other countries as well. This is also due to the fact that other actors will start using or repurposing the malware either entirely or in parts. Past experiences have shown that many malidious programs are used by so-called "script kiddies" who intend to cobble together new malware using readily available parts while having only minimal coding skills. This has happened, for instance, with the "HiddenTear" ransomware, which was originally designed for training and education. It had some flaws in its cryptographic components (which had also been documented by the developer) - but this did not keep some from using the flawed encryption components to create "real" ransomware.
The versions of Rurktar which are known so far are detected by all G DATA solutions as MSIL.Backdoor.Rurktar.A.
Many functions and configuration parameters are defined but not implemented yet. The following table shows a small excerpt:
You can read up on further technical information in Nathan Stern's detailed analysis report. The report is downloadable using the link below.