End-to-End Analysis of a Domain Generating Algorithm Malware Family

CrowdStrike
CrowdStrikeCrowdStrike
End-to-End Analysis of a
Domain Generating
Algorithm Malware Family
Jason Geffner
Sr. Security Researcher
CrowdStrike, Inc.
Black Hat USA 2013
Domain Generating Algorithms
• Most modern malware communicates with
attackers’ servers
• Typical bots/RATs/downloaders
• DGA malware
DGA Example
•  Every minute, have malware connect to GMT-time-
based server address
•  <month><day><year><hour><minute>.com
•  On July 31, 2013, at 2:30 PM, malware connects to
0731131430.com
•  Attacker registers domain and server prior to strike-time
•  Attacker redirects domain and takes down server
immediately aer strike-time
Notable DGA History
•  Early 2008 – Kraken one of the first malware families to
use a DGA
•  Late 2008 – Conficker first discovered
•  2010 – Texas A&M University researchers publish paper
on detecting DGA domain names
•  2012 – Damballa releases whitepaper on new DGA use
in six malware families
New DGA Family
•  In February of 2013, a major American financial
services firm received a suspicious email with an EXE
file attachment
•  Firm’s CISO sent the attachment to their “global cyber
intelligence” partner, who had trouble analyzing it:
“It is the obfuscation that is throwing redacted off.”
•  As a result, the CISO forwarded it to us
REDACTED
Code Obfuscation
• Most obfuscated malware is obfuscated with a
packer
• This malware uses inline code obfuscation
This snippet of disassembly
shows random 32-bit values
being assigned to variables
and used in mathematical
calculations.
This junk code is interspersed
with legitimate code.
x	
  
	
  ✔	
  
x	
  
x	
  
x	
  
x	
  
x	
  
x	
  
x	
  
x	
  
x	
  
x	
  
	
  ✔	
  
x	
  
x	
  
x	
  
	
  ✔	
  
	
  ✔	
  
x	
  
x	
  
x	
  
x	
  
This snippet of disassembly
shows random 32-bit values
being assigned to variables
and used in mathematical
calculations.
This junk code is interspersed
with legitimate code.
End-to-End Analysis of a Domain Generating Algorithm Malware Family
End-to-End Analysis of a Domain Generating Algorithm Malware Family
End-to-End Analysis of a Domain Generating Algorithm Malware Family
Code Deobfuscation
•  Find all basic legitimate variables
•  Function arguments to the current function
•  Global variables
•  Local function variables used as parameters to function calls
•  Local function variables that store return values of function calls
•  All other local function variables considered legitimate if
their values are read from or written to other legitimate
variables
Decompilation Graph, Before Deobfuscation
Decompilation Graph, Aer Deobfuscation
Demo
CrowdDetox
CrowdDetox
• Free open-source plugin for Hex-Rays
• Finds legitimate variables and code in a
decompilation graph, and prunes everything else
• Available at
http://www.crowdstrike.com/community-tools
Data Obfuscation
•  EXE contains no readable static strings related to
malicious functionality
•  No registry keys
•  No file names
•  No server addresses
•  No URI paths
•  All strings are decrypted at run time
End-to-End Analysis of a Domain Generating Algorithm Malware Family
Dynamically Deobfuscating Data
•  Within first hour of incident response
•  Found string decryption function
•  Identified list of encrypted strings
•  Patched binary to decrypt strings in-place as opposed to
on heap
•  Patched binary with hand-written assembly to call string
decryption function on each encrypted string
Statically Deobfuscating Data
• String decryption function XORs encrypted strings
with one-time pad
• One-time pad is generated at run time
Generation of One-Time Pad
for	
  (i	
  =	
  0;	
  i	
  <	
  lengthOfOneTimePad;	
  i	
  +=	
  4)	
  
{	
  
	
  	
  	
  	
  oneTimePad[i	
  +	
  0]	
  =	
  (seed	
  >>	
  0x00)	
  &	
  0xFF;	
  
	
  	
  	
  	
  oneTimePad[i	
  +	
  1]	
  =	
  (seed	
  >>	
  0x08)	
  &	
  0xFF;	
  
	
  	
  	
  	
  oneTimePad[i	
  +	
  2]	
  =	
  (seed	
  >>	
  0x10)	
  &	
  0xFF;	
  
	
  	
  	
  	
  oneTimePad[i	
  +	
  3]	
  =	
  (seed	
  >>	
  0x18)	
  &	
  0xFF;	
  
	
  
	
  	
  	
  	
  seedRotated	
  =	
  ((seed	
  >>	
  1)	
  |	
  (seed	
  <<	
  (32	
  -­‐	
  1)));	
  
	
  
	
  	
  	
  	
  seed	
  =	
  
	
  	
  	
  	
  	
  	
  	
  	
  (seedRotated	
  &	
  0xFFFF0000)	
  |	
  
	
  	
  	
  	
  	
  	
  	
  	
  ((seedRotated	
  +	
  ((seedRotated	
  >>	
  0x08)	
  &	
  0xFF))	
  &	
  0xFF)	
  <<	
  0x08)	
  |	
  
	
  	
  	
  	
  	
  	
  	
  	
  ((2	
  *	
  seedRotated	
  +	
  ((seedRotated	
  >>	
  0x08)	
  &	
  0xFF))	
  &	
  0xFF);	
  
}	
  
Statically Decrypting All Strings
for	
  (i	
  =	
  0;	
  i	
  <	
  (lengthOfOneTimePad	
  –	
  0x0C);	
  i++)	
  
{	
  
	
  	
  	
  	
  beginningOfStrings[i]	
  ^=	
  oneTimePad[0x0C	
  +	
  i];	
  
}	
  
Malware Family Template
•  Initially collected over 100 variants from this malware family
•  Most use randomized strings in decrypted data
•  File names
•  Directory names
•  Registry names
•  A few use template placeholders instead of randomized
strings
Malware Family History
• CrowdStrike initially collected:
•  16 “template” variants
•  132 non-“template” variants
• PE Timestamps appear to be legitimate
• Malware first built and distributed in February,
2013
Variants Grouped by PE Timestamp
0
5
10
15
20
25
30
35
40
45
2/2/13,
21:00
2/2/13,
22:00
… 2/5/13,
18:00
2/5/13,
19:00
2/5/13,
20:00
"Template" Variants
Non-"Template" Variants
NumberofVariants
PE Timestamp, Bucketed by Hour (UTC)
Authorship Clues in Decrypted Strings
• All variants using default template have the same
seed value: 0x445A4950
• Parsed as ASCII, 0x445A4950 = “PIZD”
• “PIZD” translates from Bosnian / Croatian /
Latvian / Polish / Romani / Romanian / Slovenian
to English as “PUSSY”
Authorship Clues in Decrypted Strings
• Template string for copied file name is
“XZSEQWSpulaosugiingat.exe”
• “pula o sug i în gât” loosely translates from
Romanian to English as “suck a dick in your
throat”
Authorship Clues in Decrypted Strings
• However, a Romanian is more likely to say, “suge
pula în gât”
• “pula o sug i în gât” is more likely the wording a
Romani would use
• Additionally, a Romanian is more likely to say
“pizda” than “pizd”; a Romani would say “pizd”
Decrypted Strings Suggest Romani Author
•  Template strings for directory name and registry value
names are “NICOLAEGUTAXZSEQWS” and
“COSTIIONITAEQWS”
•  Template string used in entry point obfuscation is
“ADRIANCOPILUMINUNESIFLORINSALAM”
•  Nicolae Guţă, Costi Ioniță, Adrian Copilul Minune, and
Florin Salam are prominent Romani manele singers
Domain Generating Algorithm
• All variants of family contain identical 384-word
list of common English words, decrypted at run
time
• Domain names created by concatenating two
pseudo-randomly selected words and
appending “.net” to the end
above
action
advance
afraid
against
airplane
almost
alone
already
although
always
amount
anger
angry
animal
another
answer
appear
apple
around
arrive
article
attempt
banker
basket
battle
beauty
became
because
become
before
begin
behind
being
believe
belong
beside
better
between
beyond
bicycle
board
borrow
bottle
bottom
branch
bread
bridge
bright
bring
broad
broken
brought
brown
building
built
business
butter
captain
carry
catch
caught
century
chair
chance
character
charge
chief
childhood
children
choose
cigarette
circle
class
clean
clear
close
clothes
college
company
complete
condition
consider
contain
continue
control
corner
country
course
cover
crowd
daughter
decide
degree
delight
demand
desire
destroy
device
difference
different
difficult
dinner
direct
discover
distance
distant
divide
doctor
dollar
double
doubt
dress
dried
during
early
eearly
effort
either
electric
electricity
english
enough
enter
escape
evening
every
except
expect
experience
explain
family
famous
fancy
father
fellow
fence
fieen
fight
figure
finger
finish
flier
flower
follow
foreign
forest
forever
forget
fortieth
forward
found
fresh
friend
further
future
garden
gather
general
gentle
gentleman
glass
glossary
goodbye
govern
guard
happen
health
heard
heart
heaven
heavy
history
honor
however
hunger
husband
include
increase
indeed
industry
inside
instead
journey
kitchen
known
labor
ladder
language
large
laugh
laughter
leader
leave
length
letter
likely
listen
little
machine
manner
market
master
material
matter
mayor
measure
meeting
member
method
middle
might
million
minute
mister
modern
morning
mother
mountain
movement
nation
nature
nearly
necessary
needle
neighbor
neither
niece
night
north
nothing
notice
number
object
oclock
office
oen
opinion
order
orderly
outside
paint
partial
party
people
perfect
perhaps
period
person
picture
pleasant
please
pleasure
position
possible
power
prepare
present
president
pretty
probable
probably
problem
produce
promise
proud
public
quarter
question
quiet
rather
ready
realize
reason
receive
record
remember
report
require
result
return
ridden
right
river
round
safety
school
season
separate
service
settle
severa
several
shake
share
shore
short
should
shoulder
shout
silver
simple
single
sister
smell
smoke
soldier
space
speak
special
spent
spread
spring
square
station
still
store
storm
straight
strange
stranger
stream
street
strength
strike
strong
student
subject
succeed
success
sudden
suffer
summer
supply
suppose
surprise
sweet
system
therefore
thick
think
third
those
though
thought
through
thrown
together
toward
trade
train
training
travel
trouble
trust
twelve
twenty
understand
understood
until
valley
value
various
wagon
water
weather
welcome
wheat
whether
while
white
whose
window
winter
within
without
woman
women
wonder
worth
would
write
written
yellow
DGA Dictionary
Domain Generating Algorithm
•  Pseudo-random algorithm uses only 15 bits of the seed value, so
only 32,768 possible domain names
Seed Value = ​seconds  elapsed  since  January  1,  1970  GMT/512 
∴ Seed Granularity = 512 seconds = 8 minutes and 32 seconds
•  Malware tries 85 domains per seed value (seed+0, seed+1, seed
+2, …), creating a sliding “window” of DGA domains
string	
  GetHostname(UInt32	
  seed)	
  
{	
  
	
  	
  byte[]	
  aShuffle	
  =	
  new	
  byte[15];	
  
	
  	
  for	
  (int	
  i	
  =	
  0;	
  i	
  <	
  15;	
  i++)	
  
	
  	
  {	
  
	
  	
  	
  	
  aShuffle[aHelperTable[i	
  *	
  2]]	
  =	
  (byte)(seed	
  &	
  1);	
  
	
  	
  	
  	
  seed	
  >>=	
  1;	
  
	
  	
  }	
  
	
  	
  
	
  	
  int	
  iHost1	
  =	
  0;	
  
	
  	
  int	
  iHost2	
  =	
  0;	
  
	
  	
  for	
  (int	
  i	
  =	
  0;	
  i	
  <	
  7;	
  i++)	
  
	
  	
  {	
  
	
  	
  	
  	
  iHost1	
  =	
  2	
  *	
  iHost1	
  |	
  aShuffle[i];	
  
	
  	
  	
  	
  iHost2	
  =	
  2	
  *	
  iHost2	
  |	
  aShuffle[i	
  +	
  7];	
  
	
  	
  }	
  
	
  	
  
	
  	
  iHost2	
  =	
  (2	
  *	
  iHost2	
  |	
  aShuffle[14])	
  +	
  128;	
  
	
  	
  
	
  	
  UInt16	
  offsetHost1	
  =	
  (UInt16)((UInt16)(aHexHostname[iHost1	
  *	
  2])	
  +	
  (UInt16)(((UInt16)(aHexHostname[iHost1	
  *	
  2	
  +	
  1]))	
  <<	
  0x08));	
  
	
  	
  UInt16	
  offsetHost2	
  =	
  (UInt16)((UInt16)(aHexHostname[iHost2	
  *	
  2])	
  +	
  (UInt16)(((UInt16)(aHexHostname[iHost2	
  *	
  2	
  +	
  1]))	
  <<	
  0x08));	
  
	
  	
  
	
  	
  string	
  host1	
  =	
  "";	
  
	
  	
  string	
  host2	
  =	
  "";	
  
	
  	
  
	
  	
  byte	
  b;	
  
	
  	
  while	
  ((b	
  =	
  aHostStrings[offsetHost1++])	
  !=	
  0)	
  
	
  	
  {	
  
	
  	
  	
  	
  host1	
  +=	
  (char)b;	
  
	
  	
  }	
  
	
  	
  while	
  ((b	
  =	
  aHostStrings[offsetHost2++])	
  !=	
  0)	
  
	
  	
  {	
  
	
  	
  	
  	
  host2	
  +=	
  (char)b;	
  
	
  	
  }	
  
	
  	
  
	
  	
  return	
  host1	
  +	
  host2	
  +	
  ".net";	
  
}	
  
Malware’s Use of DGA
• Malware regularly connects to DGA domains to
send HTTP GET request
•  /forum/search.php?email=<hardcoded email
address>&method=post
• Each malware variant has a unique hardcoded
email address
Malware’s Use of DGA
• If the server’s response contains the correct
fingerprint, the malware requests the same URL
again
• If the server’s second response contains the
correct fingerprint, the malware saves the
downloaded content as an EXE and executes it
Sinkholing
•  Sinkholed five domains to which the DGA would resolve on:
•  March 5, 2013
•  March 6, 2013
•  March 7, 2013
•  March 8, 2013
•  March 9, 2013
•  Nearly 15,000 hits from malware
•  Logged 1,170 unique client IP addresses
•  Logged 1,000 unique email addresses posted to sinkhole servers
0
1000
2000
3000
4000
5000
6000
7000
8000
Sinkhole ActivityHitsperday
Example Email Addresses Posted to Sinkholes
•  1800flowers@1800reminders.com
•  billing@deluxeforbusiness.com
•  consultant_fiscal-unsubscribe@yahoogroups.com
•  fbmessage+fepvdccz@facebookmail.com
•  geico_claims@geico.com
•  northwest.airlines@nwa.com
More Email Addresses Posted to Sinkholes
•  421 personal yahoo.com addresses
•  66 personal aol.com addresses
•  59 personal hotmail.com addresses
•  31 personal comcast.net addresses
•  4 .gov addresses
•  1 .mil address
•  0 gmail.com addresses
Sinkhole Hits From IP Addresses
1.  United States
2.  Romania
3.  Japan
4.  Russia
5.  Germany
6.  France
7.  India
8.  Netherlands
9.  United Kingdom
10.  Sweden
575
321
46
17
15
15
14
14
13
11
DGA Monitoring
• Developed automation solution to download
from DGA domains in real-time
• Domains connected to campaign responded
with identifiable HTTP response fingerprint
• Automation ran for two weeks
• Detected 20 domains connected to campaign
Domain Analysis
•  19 of the 20 domains
•  Registered via and hosted by Yahoo! Inc.’s Small Business
hosting plan
•  Registrants used @yahoo.com email account
•  1 of the 20 domains
•  Registered via and hosted by Omnis Network LLC
•  Registrants used @aol.com email account
Domain Analysis
•  All domains registered 0-48 hours before DGA pointed
to them
•  Identical registrant names and addresses used for
several domains, with semi-random phone numbers
corresponding to city area code
DOMAIN REGISTRANT ADMIN EMAIL ADMIN PHONE
amountcondition.net Robert Seifert
2212 W. Farwell
Chicago, IL 60645
seifertrobertw@yahoo.com +1.7737916544
weathereearly.net Robert Seifert
2212 W. Farwell
Chicago, IL 60645
robertwseifert@yahoo.com +1.7737916324
heardstrong.net Lynette Conlan
210 Pinehurst Way
San francisco, CA 94080
donnybonham184@yahoo.com +1.6505882763
variousopinion.net Lynette Conlan
210 Pinehurst Way
San francisco, CA 94080
alankimberley@yahoo.com +1.6505882742
morningpaint.net clint Bertke
299 lowry rd
fort recovery, OH 45846
clintmbertke@yahoo.com +1.4198523054
withinshould.net bertke, clint m
299 lowry rd
fort recovery, OH 45846
clintmbertke@aol.com +1.4198523054
Historic WHOIS Research
• 7 of the 20 domains hosted blank root webpages
during WHOIS research
• 3 of the 20 domains’ webservers were down
during WHOIS research
• The other 10 domains all hosted content for
“GlobalPartners Hungaria K.”
End-to-End Analysis of a Domain Generating Algorithm Malware Family
End-to-End Analysis of a Domain Generating Algorithm Malware Family
Sokratis Kokkalis
Chairman and CEO of
Intracom Holdings
Petros Souretis
Managing Director of
INTRAKAT, a subsidiary
of
Intracom Holdings
Sokratis Kokkalis
Chairman and CEO of
Intracom Holdings
Petros Souretis
Managing Director of
INTRAKAT, a subsidiary
of
Intracom Holdings
Sokratis Kokkalis
Chairman and CEO of
Intracom Holdings
INTRAKAT’s logo	
  
Scanning All DGA Domains
•  Scanned root webpage of all 32,768 possible DGA domains
for “GlobalPartners”
•  Found 44 additional domains, for a total of 64 campaign
domains
•  All but two registered through a Yahoo! Small Business
hosting plan
•  All domains registered for exactly one year
•  Oldest domain registered on February 3rd, 2013
Campaign Domain Registrant Email Addresses
•  Email addresses primarily fall into one of four categories
1.  Related to name of domain’s registrant
(marcosuriano21@yahoo.com for Marco Suriano)
2.  Related to name of another domain’s registrant, likely a mistake
made by adversary
(ike2ricchio4@yahoo.com for Kai Roth)
3.  Related to domain name
(degreeanimal@yahoo.com for degreeanimal.net)
4.  Related to domain name of another domain
(degreeanimal@yahoo.com for nightwagon.net)
Non-DGA Domains Used in Campaign
•  Open-source research led to non-DGA domains also
used in this campaign
•  antaragroup.org
•  ahai-group.com
•  azrhgroup.com
•  fastwire.us
•  int-group.us
•  international-wire.com
•  intracombusiness.com
•  intracomfinancial.com
•  itpservices.us
•  kpl-business.com
•  logicom-holding.com
•  mtkoffice.co.uk
•  rbs-partners.com
•  trust-core.net
End-to-End Analysis of a Domain Generating Algorithm Malware Family
Previously Researched Campaign History
•  Further investigation leads to research on anti-fraud site
http://www.bobbear.co.uk/
Extended Campaign History
•  March 2013
•  March 2013
•  February 2013
•  January 2013
•  September 2012
•  July 2011
•  April 2011
•  November 2009
Trust Core
Mojo Directo
GlobalPartners
Anatara Group
Ahai Group
Azure Holding Group
KPL
Logicom
•  May 2009
•  February 2009
•  December 2008
•  November 2008
•  June 2008
•  January 2008
•  September 2007
•  May 2007
RBS Partners
FastWire Group
INTRACOM
MTK
ITP
International Wire
INT Group
Interpay Group
Antivirus Detections
•  Malware appears to have begun circulating in
February 2013
•  Our analysis conducted in February and early March of
2013
•  Avast discovered a variant of it in June of 2013 -
https://blog.avast.com/2013/06/18/your-facebook-
connection-is-now-secured/
Antivirus Detections
Detection
Rate
Engine
Most Common
Detection
Detection
Rate
Engine
Most Common
Detection
100.0% Malwarebytes Trojan.Agent 88.4% Fortinet W32/Agent
99.3% ESET Win32/Agent 81.0% Norman Malware
98.6% AVG Generic_r 76.9% GFI VIPRE Trojan.Win32.Agent
98.6% Kaspersky Trojan.Win32.Generic 75.5% Avast Win32:Agent
98.0% Panda Trj/Genetic 38.1% McAfee Artemis
98.0% Sophos Troj/Agent 21.8% Trend Micro TROJ_GEN
95.2% G Data Gen:Variant.Zusy 17.7% Symantec WS.Reputation.1
93.2% Bitdefender Gen:Variant.Zusy 15.0% Microso Win32/Suppobox
91.8% F-Secure Gen:Variant.Zusy 0% ClamAV
Conclusion
•  DGA downloader likely authored by Romani male, who appears to be
working with a long-running European money mule crime syndicate
•  Another component apparently harvests email addresses, builds the
DGA component, and emails it to target recipients
•  DGA domains appear to be registered using stolen credit card
numbers
•  Inlined code obfuscation can be defeated with new CrowdDetox
plugin for Hex-Rays
Q & A
Special thanks to Alex Ionescu
for Romanian translations
@CrowdStrike
1 of 62

Recommended

The Travelling Pentester: Diaries of the Shortest Path to Compromise by
The Travelling Pentester: Diaries of the Shortest Path to CompromiseThe Travelling Pentester: Diaries of the Shortest Path to Compromise
The Travelling Pentester: Diaries of the Shortest Path to CompromiseWill Schroeder
9.1K views45 slides
Distributed stream processing with Apache Kafka by
Distributed stream processing with Apache KafkaDistributed stream processing with Apache Kafka
Distributed stream processing with Apache Kafkaconfluent
6.1K views66 slides
Cloud Monitoring tool Grafana by
Cloud Monitoring  tool Grafana Cloud Monitoring  tool Grafana
Cloud Monitoring tool Grafana Dhrubaji Mandal ♛
1.7K views35 slides
Polyglot persistence @ netflix (CDE Meetup) by
Polyglot persistence @ netflix (CDE Meetup) Polyglot persistence @ netflix (CDE Meetup)
Polyglot persistence @ netflix (CDE Meetup) Roopa Tangirala
5.1K views96 slides
Apache Kafka Best Practices by
Apache Kafka Best PracticesApache Kafka Best Practices
Apache Kafka Best PracticesDataWorks Summit/Hadoop Summit
66K views35 slides
[Defcon] Hardware backdooring is practical by
[Defcon] Hardware backdooring is practical[Defcon] Hardware backdooring is practical
[Defcon] Hardware backdooring is practicalMoabi.com
130.2K views70 slides

More Related Content

What's hot

Prometheus design and philosophy by
Prometheus design and philosophy   Prometheus design and philosophy
Prometheus design and philosophy Docker, Inc.
2.7K views32 slides
MeetUp Monitoring with Prometheus and Grafana (September 2018) by
MeetUp Monitoring with Prometheus and Grafana (September 2018)MeetUp Monitoring with Prometheus and Grafana (September 2018)
MeetUp Monitoring with Prometheus and Grafana (September 2018)Lucas Jellema
6.2K views37 slides
Apache Kafka by
Apache KafkaApache Kafka
Apache KafkaSaroj Panyasrivanit
375 views35 slides
OpenStack API's and WSGI by
OpenStack API's and WSGIOpenStack API's and WSGI
OpenStack API's and WSGIMike Pittaro
25.6K views21 slides
Kafka Security 101 and Real-World Tips by
Kafka Security 101 and Real-World Tips Kafka Security 101 and Real-World Tips
Kafka Security 101 and Real-World Tips confluent
6.6K views39 slides
Exploring the power of OpenTelemetry on Kubernetes by
Exploring the power of OpenTelemetry on KubernetesExploring the power of OpenTelemetry on Kubernetes
Exploring the power of OpenTelemetry on KubernetesRed Hat Developers
1.6K views47 slides

What's hot(20)

Prometheus design and philosophy by Docker, Inc.
Prometheus design and philosophy   Prometheus design and philosophy
Prometheus design and philosophy
Docker, Inc.2.7K views
MeetUp Monitoring with Prometheus and Grafana (September 2018) by Lucas Jellema
MeetUp Monitoring with Prometheus and Grafana (September 2018)MeetUp Monitoring with Prometheus and Grafana (September 2018)
MeetUp Monitoring with Prometheus and Grafana (September 2018)
Lucas Jellema6.2K views
OpenStack API's and WSGI by Mike Pittaro
OpenStack API's and WSGIOpenStack API's and WSGI
OpenStack API's and WSGI
Mike Pittaro25.6K views
Kafka Security 101 and Real-World Tips by confluent
Kafka Security 101 and Real-World Tips Kafka Security 101 and Real-World Tips
Kafka Security 101 and Real-World Tips
confluent6.6K views
Exploring the power of OpenTelemetry on Kubernetes by Red Hat Developers
Exploring the power of OpenTelemetry on KubernetesExploring the power of OpenTelemetry on Kubernetes
Exploring the power of OpenTelemetry on Kubernetes
Red Hat Developers1.6K views
How is Kafka so Fast? by Ricardo Paiva
How is Kafka so Fast?How is Kafka so Fast?
How is Kafka so Fast?
Ricardo Paiva1.4K views
Delta Lake Streaming: Under the Hood by Databricks
Delta Lake Streaming: Under the HoodDelta Lake Streaming: Under the Hood
Delta Lake Streaming: Under the Hood
Databricks878 views
Securing Kafka by confluent
Securing Kafka Securing Kafka
Securing Kafka
confluent14.6K views
Apache Lucene/Solr Document Classification by Sease
Apache Lucene/Solr Document ClassificationApache Lucene/Solr Document Classification
Apache Lucene/Solr Document Classification
Sease290 views
Spark Summit EU talk by Ted Malaska by Spark Summit
Spark Summit EU talk by Ted MalaskaSpark Summit EU talk by Ted Malaska
Spark Summit EU talk by Ted Malaska
Spark Summit8.8K views
Monitoring Kubernetes with Prometheus by Grafana Labs
Monitoring Kubernetes with PrometheusMonitoring Kubernetes with Prometheus
Monitoring Kubernetes with Prometheus
Grafana Labs648 views
Apache Kafka Architecture & Fundamentals Explained by confluent
Apache Kafka Architecture & Fundamentals ExplainedApache Kafka Architecture & Fundamentals Explained
Apache Kafka Architecture & Fundamentals Explained
confluent27.6K views
Improved alerting with Prometheus and Alertmanager by Julien Pivotto
Improved alerting with Prometheus and AlertmanagerImproved alerting with Prometheus and Alertmanager
Improved alerting with Prometheus and Alertmanager
Julien Pivotto4.5K views
Apache Flink Stream Processing by Suneel Marthi
Apache Flink Stream ProcessingApache Flink Stream Processing
Apache Flink Stream Processing
Suneel Marthi1.4K views
Introduction to ML with Apache Spark MLlib by Taras Matyashovsky
Introduction to ML with Apache Spark MLlibIntroduction to ML with Apache Spark MLlib
Introduction to ML with Apache Spark MLlib
Taras Matyashovsky5.8K views

Similar to End-to-End Analysis of a Domain Generating Algorithm Malware Family

What are-you-investigate-today? (version 2.0) by
What are-you-investigate-today? (version 2.0)What are-you-investigate-today? (version 2.0)
What are-you-investigate-today? (version 2.0)Xavier Mertens
4.5K views43 slides
What Will You Investigate Today? by
What Will You Investigate Today?What Will You Investigate Today?
What Will You Investigate Today?Xavier Mertens
2.1K views32 slides
Hunting on the cheap by
Hunting on the cheapHunting on the cheap
Hunting on the cheapAnjum Ahuja
329 views53 slides
Hunting on the Cheap by
Hunting on the CheapHunting on the Cheap
Hunting on the CheapEndgameInc
1.6K views53 slides
ShmooCon 2015: No Budget Threat Intelligence - Tracking Malware Campaigns on ... by
ShmooCon 2015: No Budget Threat Intelligence - Tracking Malware Campaigns on ...ShmooCon 2015: No Budget Threat Intelligence - Tracking Malware Campaigns on ...
ShmooCon 2015: No Budget Threat Intelligence - Tracking Malware Campaigns on ...Andrew Morris
2.9K views63 slides
Protect Your Payloads: Modern Keying Techniques by
Protect Your Payloads: Modern Keying TechniquesProtect Your Payloads: Modern Keying Techniques
Protect Your Payloads: Modern Keying TechniquesLeo Loobeek
1.4K views70 slides

Similar to End-to-End Analysis of a Domain Generating Algorithm Malware Family(20)

What are-you-investigate-today? (version 2.0) by Xavier Mertens
What are-you-investigate-today? (version 2.0)What are-you-investigate-today? (version 2.0)
What are-you-investigate-today? (version 2.0)
Xavier Mertens4.5K views
What Will You Investigate Today? by Xavier Mertens
What Will You Investigate Today?What Will You Investigate Today?
What Will You Investigate Today?
Xavier Mertens2.1K views
Hunting on the cheap by Anjum Ahuja
Hunting on the cheapHunting on the cheap
Hunting on the cheap
Anjum Ahuja329 views
Hunting on the Cheap by EndgameInc
Hunting on the CheapHunting on the Cheap
Hunting on the Cheap
EndgameInc1.6K views
ShmooCon 2015: No Budget Threat Intelligence - Tracking Malware Campaigns on ... by Andrew Morris
ShmooCon 2015: No Budget Threat Intelligence - Tracking Malware Campaigns on ...ShmooCon 2015: No Budget Threat Intelligence - Tracking Malware Campaigns on ...
ShmooCon 2015: No Budget Threat Intelligence - Tracking Malware Campaigns on ...
Andrew Morris2.9K views
Protect Your Payloads: Modern Keying Techniques by Leo Loobeek
Protect Your Payloads: Modern Keying TechniquesProtect Your Payloads: Modern Keying Techniques
Protect Your Payloads: Modern Keying Techniques
Leo Loobeek1.4K views
REMnux tutorial-2: Extraction and decoding of Artifacts by Rhydham Joshi
REMnux tutorial-2: Extraction and decoding of ArtifactsREMnux tutorial-2: Extraction and decoding of Artifacts
REMnux tutorial-2: Extraction and decoding of Artifacts
Rhydham Joshi6K views
12 Investigating Windows Systems (Part 2 of 3) by Sam Bowne
12 Investigating Windows Systems (Part 2 of 3)12 Investigating Windows Systems (Part 2 of 3)
12 Investigating Windows Systems (Part 2 of 3)
Sam Bowne30 views
OSINT for Attack and Defense by Andrew McNicol
OSINT for Attack and DefenseOSINT for Attack and Defense
OSINT for Attack and Defense
Andrew McNicol9.8K views
An Adversarial View of SaaS Malware Sandboxes by Jason Trost
An Adversarial View of SaaS Malware SandboxesAn Adversarial View of SaaS Malware Sandboxes
An Adversarial View of SaaS Malware Sandboxes
Jason Trost1.5K views
CNIT 152: 12b Windows Registry by Sam Bowne
CNIT 152: 12b Windows RegistryCNIT 152: 12b Windows Registry
CNIT 152: 12b Windows Registry
Sam Bowne485 views
CNIT 152 12 Investigating Windows Systems (Part 2) by Sam Bowne
CNIT 152 12 Investigating Windows Systems (Part 2)CNIT 152 12 Investigating Windows Systems (Part 2)
CNIT 152 12 Investigating Windows Systems (Part 2)
Sam Bowne185 views
Malware Analysis Using Free Software by Xavier Mertens
Malware Analysis Using Free SoftwareMalware Analysis Using Free Software
Malware Analysis Using Free Software
Xavier Mertens4.3K views
CNIT 152: 12 Investigating Windows Systems (Part 2 of 3) by Sam Bowne
CNIT 152: 12 Investigating Windows Systems (Part 2 of 3)CNIT 152: 12 Investigating Windows Systems (Part 2 of 3)
CNIT 152: 12 Investigating Windows Systems (Part 2 of 3)
Sam Bowne605 views
Malicious Domain Profiling by E Hacking
Malicious Domain Profiling Malicious Domain Profiling
Malicious Domain Profiling
E Hacking2.9K views
Ch 4: Footprinting and Social Engineering by Sam Bowne
Ch 4: Footprinting and Social EngineeringCh 4: Footprinting and Social Engineering
Ch 4: Footprinting and Social Engineering
Sam Bowne2.9K views
Keith J. Jones, Ph.D. - Crash Course malware analysis by Keith Jones, PhD
Keith J. Jones, Ph.D. - Crash Course malware analysisKeith J. Jones, Ph.D. - Crash Course malware analysis
Keith J. Jones, Ph.D. - Crash Course malware analysis
Keith Jones, PhD334 views
13 practical tips for writing secure golang applications by Karthik Gaekwad
13 practical tips for writing secure golang applications13 practical tips for writing secure golang applications
13 practical tips for writing secure golang applications
Karthik Gaekwad9.5K views

More from CrowdStrike

State of Endpoint Security: The Buyers Mindset by
State of Endpoint Security: The Buyers MindsetState of Endpoint Security: The Buyers Mindset
State of Endpoint Security: The Buyers MindsetCrowdStrike
7K views20 slides
Understanding Fileless (or Non-Malware) Attacks and How to Stop Them by
Understanding Fileless (or Non-Malware) Attacks and How to Stop ThemUnderstanding Fileless (or Non-Malware) Attacks and How to Stop Them
Understanding Fileless (or Non-Malware) Attacks and How to Stop ThemCrowdStrike
3K views25 slides
Cyber Security Extortion: Defending Against Digital Shakedowns by
Cyber Security Extortion: Defending Against Digital Shakedowns Cyber Security Extortion: Defending Against Digital Shakedowns
Cyber Security Extortion: Defending Against Digital Shakedowns CrowdStrike
2.3K views30 slides
An Inside Look At The WannaCry Ransomware Outbreak by
An Inside Look At The WannaCry Ransomware OutbreakAn Inside Look At The WannaCry Ransomware Outbreak
An Inside Look At The WannaCry Ransomware OutbreakCrowdStrike
1.7K views26 slides
Proactive Threat Hunting: Game-Changing Endpoint Protection Beyond Alerting by
Proactive Threat Hunting: Game-Changing Endpoint Protection Beyond AlertingProactive Threat Hunting: Game-Changing Endpoint Protection Beyond Alerting
Proactive Threat Hunting: Game-Changing Endpoint Protection Beyond AlertingCrowdStrike
2.5K views22 slides
DEFENDING AGAINST THREATS TARGETING THE MAC PLATFORM by
DEFENDING AGAINST THREATS TARGETING THE MAC PLATFORMDEFENDING AGAINST THREATS TARGETING THE MAC PLATFORM
DEFENDING AGAINST THREATS TARGETING THE MAC PLATFORMCrowdStrike
1.2K views21 slides

More from CrowdStrike(20)

State of Endpoint Security: The Buyers Mindset by CrowdStrike
State of Endpoint Security: The Buyers MindsetState of Endpoint Security: The Buyers Mindset
State of Endpoint Security: The Buyers Mindset
CrowdStrike7K views
Understanding Fileless (or Non-Malware) Attacks and How to Stop Them by CrowdStrike
Understanding Fileless (or Non-Malware) Attacks and How to Stop ThemUnderstanding Fileless (or Non-Malware) Attacks and How to Stop Them
Understanding Fileless (or Non-Malware) Attacks and How to Stop Them
CrowdStrike3K views
Cyber Security Extortion: Defending Against Digital Shakedowns by CrowdStrike
Cyber Security Extortion: Defending Against Digital Shakedowns Cyber Security Extortion: Defending Against Digital Shakedowns
Cyber Security Extortion: Defending Against Digital Shakedowns
CrowdStrike2.3K views
An Inside Look At The WannaCry Ransomware Outbreak by CrowdStrike
An Inside Look At The WannaCry Ransomware OutbreakAn Inside Look At The WannaCry Ransomware Outbreak
An Inside Look At The WannaCry Ransomware Outbreak
CrowdStrike1.7K views
Proactive Threat Hunting: Game-Changing Endpoint Protection Beyond Alerting by CrowdStrike
Proactive Threat Hunting: Game-Changing Endpoint Protection Beyond AlertingProactive Threat Hunting: Game-Changing Endpoint Protection Beyond Alerting
Proactive Threat Hunting: Game-Changing Endpoint Protection Beyond Alerting
CrowdStrike2.5K views
DEFENDING AGAINST THREATS TARGETING THE MAC PLATFORM by CrowdStrike
DEFENDING AGAINST THREATS TARGETING THE MAC PLATFORMDEFENDING AGAINST THREATS TARGETING THE MAC PLATFORM
DEFENDING AGAINST THREATS TARGETING THE MAC PLATFORM
CrowdStrike1.2K views
CrowdStrike CrowdCast: Is Ransomware Morphing Beyond The Ability Of Standard ... by CrowdStrike
CrowdStrike CrowdCast: Is Ransomware Morphing Beyond The Ability Of Standard ...CrowdStrike CrowdCast: Is Ransomware Morphing Beyond The Ability Of Standard ...
CrowdStrike CrowdCast: Is Ransomware Morphing Beyond The Ability Of Standard ...
CrowdStrike1.1K views
How to Replace Your Legacy Antivirus Solution with CrowdStrike by CrowdStrike
How to Replace Your Legacy Antivirus Solution with CrowdStrikeHow to Replace Your Legacy Antivirus Solution with CrowdStrike
How to Replace Your Legacy Antivirus Solution with CrowdStrike
CrowdStrike2.8K views
Cloud-Enabled: The Future of Endpoint Security by CrowdStrike
Cloud-Enabled: The Future of Endpoint SecurityCloud-Enabled: The Future of Endpoint Security
Cloud-Enabled: The Future of Endpoint Security
CrowdStrike2.7K views
Bear Hunting: History and Attribution of Russian Intelligence Operations by CrowdStrike
Bear Hunting: History and Attribution of Russian Intelligence OperationsBear Hunting: History and Attribution of Russian Intelligence Operations
Bear Hunting: History and Attribution of Russian Intelligence Operations
CrowdStrike5K views
You Can't Stop The Breach Without Prevention And Detection by CrowdStrike
You Can't Stop The Breach Without Prevention And DetectionYou Can't Stop The Breach Without Prevention And Detection
You Can't Stop The Breach Without Prevention And Detection
CrowdStrike1.2K views
Battling Unknown Malware with Machine Learning by CrowdStrike
Battling Unknown Malware with Machine Learning Battling Unknown Malware with Machine Learning
Battling Unknown Malware with Machine Learning
CrowdStrike2K views
Java Journal & Pyresso: A Python-Based Framework for Debugging Java by CrowdStrike
Java Journal & Pyresso: A Python-Based Framework for Debugging JavaJava Journal & Pyresso: A Python-Based Framework for Debugging Java
Java Journal & Pyresso: A Python-Based Framework for Debugging Java
CrowdStrike1.8K views
CrowdCasts Monthly: When Pandas Attack by CrowdStrike
CrowdCasts Monthly: When Pandas AttackCrowdCasts Monthly: When Pandas Attack
CrowdCasts Monthly: When Pandas Attack
CrowdStrike4.6K views
CrowdCast Monthly: Operationalizing Intelligence by CrowdStrike
CrowdCast Monthly: Operationalizing IntelligenceCrowdCast Monthly: Operationalizing Intelligence
CrowdCast Monthly: Operationalizing Intelligence
CrowdStrike6.7K views
CrowdCasts Monthly: Going Beyond the Indicator by CrowdStrike
CrowdCasts Monthly: Going Beyond the IndicatorCrowdCasts Monthly: Going Beyond the Indicator
CrowdCasts Monthly: Going Beyond the Indicator
CrowdStrike3.6K views
CrowdCasts Monthly: You Have an Adversary Problem by CrowdStrike
CrowdCasts Monthly: You Have an Adversary ProblemCrowdCasts Monthly: You Have an Adversary Problem
CrowdCasts Monthly: You Have an Adversary Problem
CrowdStrike20.8K views
CrowdCasts Monthly: Mitigating Pass the Hash by CrowdStrike
CrowdCasts Monthly: Mitigating Pass the HashCrowdCasts Monthly: Mitigating Pass the Hash
CrowdCasts Monthly: Mitigating Pass the Hash
CrowdStrike2.7K views
TOR... ALL THE THINGS by CrowdStrike
TOR... ALL THE THINGSTOR... ALL THE THINGS
TOR... ALL THE THINGS
CrowdStrike7.8K views

Recently uploaded

20231123_Camunda Meetup Vienna.pdf by
20231123_Camunda Meetup Vienna.pdf20231123_Camunda Meetup Vienna.pdf
20231123_Camunda Meetup Vienna.pdfPhactum Softwareentwicklung GmbH
33 views73 slides
Empathic Computing: Delivering the Potential of the Metaverse by
Empathic Computing: Delivering  the Potential of the MetaverseEmpathic Computing: Delivering  the Potential of the Metaverse
Empathic Computing: Delivering the Potential of the MetaverseMark Billinghurst
476 views80 slides
handbook for web 3 adoption.pdf by
handbook for web 3 adoption.pdfhandbook for web 3 adoption.pdf
handbook for web 3 adoption.pdfLiveplex
22 views16 slides
Attacking IoT Devices from a Web Perspective - Linux Day by
Attacking IoT Devices from a Web Perspective - Linux Day Attacking IoT Devices from a Web Perspective - Linux Day
Attacking IoT Devices from a Web Perspective - Linux Day Simone Onofri
15 views68 slides
Special_edition_innovator_2023.pdf by
Special_edition_innovator_2023.pdfSpecial_edition_innovator_2023.pdf
Special_edition_innovator_2023.pdfWillDavies22
17 views6 slides
AMAZON PRODUCT RESEARCH.pdf by
AMAZON PRODUCT RESEARCH.pdfAMAZON PRODUCT RESEARCH.pdf
AMAZON PRODUCT RESEARCH.pdfJerikkLaureta
19 views13 slides

Recently uploaded(20)

Empathic Computing: Delivering the Potential of the Metaverse by Mark Billinghurst
Empathic Computing: Delivering  the Potential of the MetaverseEmpathic Computing: Delivering  the Potential of the Metaverse
Empathic Computing: Delivering the Potential of the Metaverse
Mark Billinghurst476 views
handbook for web 3 adoption.pdf by Liveplex
handbook for web 3 adoption.pdfhandbook for web 3 adoption.pdf
handbook for web 3 adoption.pdf
Liveplex22 views
Attacking IoT Devices from a Web Perspective - Linux Day by Simone Onofri
Attacking IoT Devices from a Web Perspective - Linux Day Attacking IoT Devices from a Web Perspective - Linux Day
Attacking IoT Devices from a Web Perspective - Linux Day
Simone Onofri15 views
Special_edition_innovator_2023.pdf by WillDavies22
Special_edition_innovator_2023.pdfSpecial_edition_innovator_2023.pdf
Special_edition_innovator_2023.pdf
WillDavies2217 views
AMAZON PRODUCT RESEARCH.pdf by JerikkLaureta
AMAZON PRODUCT RESEARCH.pdfAMAZON PRODUCT RESEARCH.pdf
AMAZON PRODUCT RESEARCH.pdf
JerikkLaureta19 views
Case Study Copenhagen Energy and Business Central.pdf by Aitana
Case Study Copenhagen Energy and Business Central.pdfCase Study Copenhagen Energy and Business Central.pdf
Case Study Copenhagen Energy and Business Central.pdf
Aitana16 views
Voice Logger - Telephony Integration Solution at Aegis by Nirmal Sharma
Voice Logger - Telephony Integration Solution at AegisVoice Logger - Telephony Integration Solution at Aegis
Voice Logger - Telephony Integration Solution at Aegis
Nirmal Sharma31 views
HTTP headers that make your website go faster - devs.gent November 2023 by Thijs Feryn
HTTP headers that make your website go faster - devs.gent November 2023HTTP headers that make your website go faster - devs.gent November 2023
HTTP headers that make your website go faster - devs.gent November 2023
Thijs Feryn21 views
Unit 1_Lecture 2_Physical Design of IoT.pdf by StephenTec
Unit 1_Lecture 2_Physical Design of IoT.pdfUnit 1_Lecture 2_Physical Design of IoT.pdf
Unit 1_Lecture 2_Physical Design of IoT.pdf
StephenTec12 views
TouchLog: Finger Micro Gesture Recognition Using Photo-Reflective Sensors by sugiuralab
TouchLog: Finger Micro Gesture Recognition  Using Photo-Reflective SensorsTouchLog: Finger Micro Gesture Recognition  Using Photo-Reflective Sensors
TouchLog: Finger Micro Gesture Recognition Using Photo-Reflective Sensors
sugiuralab19 views
GDG Cloud Southlake 28 Brad Taylor and Shawn Augenstein Old Problems in the N... by James Anderson
GDG Cloud Southlake 28 Brad Taylor and Shawn Augenstein Old Problems in the N...GDG Cloud Southlake 28 Brad Taylor and Shawn Augenstein Old Problems in the N...
GDG Cloud Southlake 28 Brad Taylor and Shawn Augenstein Old Problems in the N...
James Anderson66 views
SAP Automation Using Bar Code and FIORI.pdf by Virendra Rai, PMP
SAP Automation Using Bar Code and FIORI.pdfSAP Automation Using Bar Code and FIORI.pdf
SAP Automation Using Bar Code and FIORI.pdf

End-to-End Analysis of a Domain Generating Algorithm Malware Family