Free Republic
Browse · Search
General/Chat
Topics · Post Article

To: bitt

https://wikileaks.org/vault7/document/Angelfire-2_0-UserGuide/Angelfire-2_0-UserGuide.pdf

techfags might like this


1,245 posted on 05/20/2021 9:55:11 PM PDT by bitt (People who wonder if the glass is half empty or half full miss the point. The glass is refillable.)
[ Post Reply | Private Reply | To 1226 | View Replies ]


To: bitt

From your link, the KEYSTONE:

1. (U) Introduction
(TS) Angelfire is an implant comprised of 5 components: Solartime, Wolfcreek, Keystone, BadMFS, and the Windows Transitory File system.
Solartime modifies the partition boot sector to load some kernel code. That kernel code then modifies the Windows boot process so that when Windows loads boot time device drivers, an implant device driver can be loaded. The implant driver and Solartime boot code (aside from the partition boot sector modifications) are kept in a small user-specified file on disk. This file is encrypted.

Wolfcreek is the kernel code that Solartime executes. Wolfcreek is a self-loading driver, that once executed, can load other drivers and user-mode applications.

Keystone is responsible for starting user applications. Any application started by MW is done without the implant ever being dropped to the file system. In other words, a process is created and the implant is loaded directly into memory. Currently all processes will be created as svchost. When viewed in task manager (or another process viewing tool) all properties of the process will be consistent with a real instance of svchost.exe including image path and parent process. Furthermore, since the implant code never touches the file system (aside from the possibility of paging) there is very little forensic evidence that the process was ever ran.


1,291 posted on 05/21/2021 8:09:31 AM PDT by Melian (Faithless is he that says farewell when the road darkens. ~ Gimli)
[ Post Reply | Private Reply | To 1245 | View Replies ]

Free Republic
Browse · Search
General/Chat
Topics · Post Article


FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson