Skeleton Key Malware

Malware which infects Domain Controllers to bypass authentication



“Dell SecureWorks Counter Threat Unit(TM) (CTU)”  originally discovered and reported on the malware. Skeleton Key malware is found on Domain Controllers. The malware is installed by attackers so that they can bypass single-factor authentication. This allows them to use the credentials of any user for privilege escalation and lateral movement while the targeted user can authenticate as normal. The malware lacks persistence since the program runs exclusively in the system RAM, and rebooting an infected domain controller will cause the attacker to have to re-infect the server from some previously installed backdoor/RAT, which was the case in the initial discovery of the malware.

In order to deploy the malware the attacker needs domain administrator privileges, which can be gained by dumping the credentials of an previously infected machine which either: has a stored domain administrator credential or an active domain administrator, and utilizing a pass-the-hash attack with the tool Mimikatz they can easily reuse the dumped domain administrator credentials.

Detection and Prevention

Since the malware runs in memory it would be difficult to spot, unless you’re familiar with what processes/services the malware uses. Since in this case the malware uses the PsExec.exe process, and the PsExec “-accepteula” command line argument specifically, monitoring Windows service installation events (event ID 7045) and service start/stop events (event ID 7036) for the PSEXESVC service would enable possibly spotting an infected domain controller. Since it also alters other settings, those changes can be scanned for by a remote tool. The tool: Aorato Skeleton Key Malware Remote DC Scanner can remotely scan domain controllers and check if they’re currently infected with Skeleton Key Malware, requires Python 2.7, and is a PowerShell script.

Since the malware is only successful against single-factor authentication, multi-factor authentication is a good preventative measure as it wouldn’t allow the attacker access to any service which is using it.

IOCs

These threat indicators can be used to search logs to detect activity related to Skeleton Key malware.

IndicatorTypeContext
66da7ed621149975f6e643b4f9886cfdMD5 hashSkeleton Key patch msuta64.dll
ad61e8daeeba43e442514b177a1b41ad4b7c6727SHA1 hashSkeleton Key patch msuta64.dll
bf45086e6334f647fda33576e2a05826MD5 hashSkeleton Key patch ole64.dll
5083b17ccc50dd0557dfc544f84e2ab55d6acd92SHA1 hashSkeleton Key patch ole64.dll

Leave a Reply