Warning! Audit Deprecated
Information
WARP is an HTTP based backdoor written in C++, and the majority of its code base is borrowed from source code available in the public
domain. Network communications are implemented using the same WWW client library (w3c.cpp) available from
www.dankrusi.com/file_69653F3336383837.html. The malware has system survey functionality (collects hostname, current user, system uptime,
CPU speed, etc.) taken directly from the BO2K backdoor available from www.bo2k.com. It also contains the hard disk identification code
found at www.winsim.com/diskid32/diskid32.cpp. The initial GET request contains beacon data describing the compromised host, including the
volume serial number, system uptime, host IP address, OS version, and hostname. This information is encrypted using an RC4-like algorithm
and then Base64 encoded. After establishing a connection, the malware will check for the 'image/gif' HTTP header returned by the command
and control server before parsing the response. The downloaded data is decrypted using the same RC4-like algorithm. The malware receives a
command byte and any additional arguments to activate the following capabilities: create a directory listing, file upload/download, execute
remote command, and system survey. The system survey functionality is taken directly from BO2K.
ref. http://intelreport.mandiant.com/Mandiant_APT1_Report_Appendix.zip p.98