SlideShare a Scribd company logo
1 of 31
Download to read offline
Basics Standards Tools Sharing IOCs IOCs composites Case Study More on Tools Questions
Incident Response tactics with Compromise Indicators
Vladimir Kropotov, Vitaly Chetvertakov, Fyodor Yarochkin
RusCrypto 2014
Affilations: Academia Sinica, o0o.nu, chroot.org
March 25-28, 2014
Incident Response tactics with Compromise Indicators Affilations: Academia Sinica, o0o.nu, chroot.org
Basics Standards Tools Sharing IOCs IOCs composites Case Study More on Tools Questions
Outline
Basics
Standards
Tools
Sharing IOCs
IOCs composites
Case Study
More on Tools
Questions
Incident Response tactics with Compromise Indicators Affilations: Academia Sinica, o0o.nu, chroot.org
Basics Standards Tools Sharing IOCs IOCs composites Case Study More on Tools Questions
Introduction
Indicators of Compromise
Indicator of compromise (IOC) in computer forensics is an artifact observed on
network or in operating system that with high confidence indicates a computer
intrusion.
http://en.wikipedia.org/wiki/Indicator_of_compromise
Incident Response tactics with Compromise Indicators Affilations: Academia Sinica, o0o.nu, chroot.org
Basics Standards Tools Sharing IOCs IOCs composites Case Study More on Tools Questions
IOC workflow
A typical flow with Indicators of Compromise: source: Sophisticated indicators for the modern
threat landscape, 2012 paper
Incident Response tactics with Compromise Indicators Affilations: Academia Sinica, o0o.nu, chroot.org
Basics Standards Tools Sharing IOCs IOCs composites Case Study More on Tools Questions
Standards: OpenIOC
OpenIOC - Mandiant-backed effort for unform representation of IOC (now
FireEye) http://www.openioc.org/
Incident Response tactics with Compromise Indicators Affilations: Academia Sinica, o0o.nu, chroot.org
Basics Standards Tools Sharing IOCs IOCs composites Case Study More on Tools Questions
Standards: Mitre
Mitre CybOX: http://cybox.mitre.org/
https://github.com/CybOXProject/Tools
https://github.com/CybOXProject/openioc-to-cybox Mitre CAPEC:
http://capec.mitre.org/ Mitre STIX: http://stix.mitre.org/ Mitre
TAXII http://taxii.mitre.org/
Incident Response tactics with Compromise Indicators Affilations: Academia Sinica, o0o.nu, chroot.org
Basics Standards Tools Sharing IOCs IOCs composites Case Study More on Tools Questions
Open-source tools
OpenIOC manipulation
https://github.com/STIXProject/openioc-to-stix
https://github.com/tklane/openiocscripts
Mantis Threat Intelligence Framework
https://github.com/siemens/django-mantis.git Mantis supports
STIX/CybOX/IODEF/OpenIOC etc via importers:
https://github.com/siemens/django-mantis-openioc-importer
Search splunk data for IOC indicators:
https://github.com/technoskald/splunk-search
Our framework: http://github.com/fygrave/iocmap/
Incident Response tactics with Compromise Indicators Affilations: Academia Sinica, o0o.nu, chroot.org
Basics Standards Tools Sharing IOCs IOCs composites Case Study More on Tools Questions
Online Sharing of IOCs
http://iocbucket.com/
Incident Response tactics with Compromise Indicators Affilations: Academia Sinica, o0o.nu, chroot.org
Basics Standards Tools Sharing IOCs IOCs composites Case Study More on Tools Questions
Policies on Sharing
Policies on sharing IOCs:
what to be shared/can be shared
who to share with
when to share
Incident Response tactics with Compromise Indicators Affilations: Academia Sinica, o0o.nu, chroot.org
Basics Standards Tools Sharing IOCs IOCs composites Case Study More on Tools Questions
Where to look for IOCs:
Outbound Network Traffic
User Activities/Failed Logins
User profile folders
Administrative Access
Access from unsual IP addresses
Database IO: excessive READs
Size of responses of web pages
Unusual access to particular files within Web Application (backdoor)
Unusual port/protocol connections
DNS and HTTP traffic requests
Suspicious Scripts, Executables and Data Files
Incident Response tactics with Compromise Indicators Affilations: Academia Sinica, o0o.nu, chroot.org
Basics Standards Tools Sharing IOCs IOCs composites Case Study More on Tools Questions
Challenges
Why we need IOCs? because it makes it easier to systematically describe
knowledge about breaches.
Identifying intrusions is hard
Unfair game:
defender should protect all the assets
attacker only needs to ’poop’ one system.
Identifying targeted, organized intrusions is even harder
Minor anomalous events are important when put together
Seeing global picture is a mast
Details matter
Attribution is hard
Incident Response tactics with Compromise Indicators Affilations: Academia Sinica, o0o.nu, chroot.org
Basics Standards Tools Sharing IOCs IOCs composites Case Study More on Tools Questions
Challenges
All networks are compromised
The difference between a good security team and a bad security team is that
with a bad security team you will never know that you’ve been compromised.
Incident Response tactics with Compromise Indicators Affilations: Academia Sinica, o0o.nu, chroot.org
Basics Standards Tools Sharing IOCs IOCs composites Case Study More on Tools Questions
An Example
A Network compromise case study:
Attackers broke via a web vuln.
Attackers gained local admin access
Attackers created a local user
Attackers started probing other machines for default user ids
Attackers launched tunneling tools – connecting back to C2
Attackers installed RATs to maintain access
Incident Response tactics with Compromise Indicators Affilations: Academia Sinica, o0o.nu, chroot.org
Basics Standards Tools Sharing IOCs IOCs composites Case Study More on Tools Questions
Indicators
So what are the compromise indicators here?
Where did attackers come from? (IP)
What vulnerability was exploited? (pattern)
What web backdoor was used? (pattern, hash)
What tools were uploaded? (hashes)
What users were created locally? (username)
What usernames were probed on other machines
Incident Response tactics with Compromise Indicators Affilations: Academia Sinica, o0o.nu, chroot.org
Basics Standards Tools Sharing IOCs IOCs composites Case Study More on Tools Questions
Good or Bad?
F i l e Name : RasTls . exe
F i l e S i z e : 105 kB
F i l e M o d i f i c a t i o n Date /Time : 2 0 0 9 : 0 2 : 0 9 1 9 : 4 2 : 0 5 + 0 8 : 0 0
F i l e Type : Win32 EXE
MIME Type : a p p l i c a t i o n / o c t e t −stream
Machine Type : I n t e l 386 o r l a t e r , and c o m p a t i b l e s
Time Stamp : 2 0 0 9 : 0 2 : 0 2 1 3 : 3 8 : 3 7 + 0 8 : 0 0
PE Type : PE32
L i n k e r V e r s i o n : 8 . 0
Code S i z e : 49152
I n i t i a l i z e d Data S i z e : 57344
U n i n i t i a l i z e d Data S i z e : 0
Entry P o i n t : 0 x3d76
OS V e r s i o n : 4 . 0
Image V e r s i o n : 0 . 0
Subsystem V e r s i o n : 4 . 0
Subsystem : Windows GUI
F i l e V e r s i o n Number : 1 1 . 0 . 4 0 1 0 . 7
Product V e r s i o n Number : 1 1 . 0 . 4 0 1 0 . 7
F i l e OS : Windows NT 32− b i t
Object F i l e Type : E x e c u t a b l e a p p l i c a t i o n
Language Code : E n g l i s h (U . S . )
C h a r a c t e r Set : Windows , L a t i n 1
Company Name : Symantec C o r p o r a t i o n
F i l e D e s c r i p t i o n : Symantec 8 0 2 . 1 x S u p p l i c a n t
F i l e V e r s i o n : 1 1 . 0 . 4 0 1 0 . 7
I n t e r n a l Name : d o t 1 x t r a y
Incident Response tactics with Compromise Indicators Affilations: Academia Sinica, o0o.nu, chroot.org
Basics Standards Tools Sharing IOCs IOCs composites Case Study More on Tools Questions
It really depends on context
RasTls . DLL
RasTls . DLL . msc
RasTls . exe
http://msdn.microsoft.com/en-us/library/ms682586(v=VS.85).aspx
Dynamic-Link Library Search Order
Incident Response tactics with Compromise Indicators Affilations: Academia Sinica, o0o.nu, chroot.org
Basics Standards Tools Sharing IOCs IOCs composites Case Study More on Tools Questions
Tools for Dynamic Detection of IOC
Snort
Yara + yara-enabled tools
Moloch
Splunk/Log search
Incident Response tactics with Compromise Indicators Affilations: Academia Sinica, o0o.nu, chroot.org
Basics Standards Tools Sharing IOCs IOCs composites Case Study More on Tools Questions
Tools for Dynamic Detection
Moloch
Moloch supports Yara (IOCs can be directly applied)
Moloch has tagger plugin:
# tagger . so
# p r o v i d e s a b i l i t y to import t e x t f i l e s with IP and/ or hostn
# i n t o a sensor that would cause autotagging of a l l matching
p l u g i n s=tagger . so
t a g g e r I p F i l e s=b l a c k l i s t , tag , tag , tag . . .
taggerDomainFiles=domainbasedblacklists , tag , tag , tag
Incident Response tactics with Compromise Indicators Affilations: Academia Sinica, o0o.nu, chroot.org
Basics Standards Tools Sharing IOCs IOCs composites Case Study More on Tools Questions
Sources of IOCs
ioc bucket:
http://iocbucket.com
Public blacklists/trackers could also be used as source:
https:
//zeustracker.abuse.ch/blocklist.php?download=ipblocklist
https:
//zeustracker.abuse.ch/blocklist.php?download=domainblocklist
Eset IOC repository
https://github.com/eset/malware-ioc
more coming?
Incident Response tactics with Compromise Indicators Affilations: Academia Sinica, o0o.nu, chroot.org
Basics Standards Tools Sharing IOCs IOCs composites Case Study More on Tools Questions
where to mine IOC
passive HTTP (keep your data recorded)
passive DNS
These platforms provide ability to mine traffic or patterns from the past based
on IOC similarity
show me all the packets similar to this IOC
We implemented a whois service for IOC look-ups
whois −h i o c . host . com a t t r i b u t e : value+a t t r i b u t e : value
Incident Response tactics with Compromise Indicators Affilations: Academia Sinica, o0o.nu, chroot.org
Basics Standards Tools Sharing IOCs IOCs composites Case Study More on Tools Questions
Mining IOCs from your own data
find and investigate incident
Or even read paper
determine indicators and test it in YOUR Environment
use new indicators in the future
see IOC cycle we mentioned earlier
Incident Response tactics with Compromise Indicators Affilations: Academia Sinica, o0o.nu, chroot.org
Basics Standards Tools Sharing IOCs IOCs composites Case Study More on Tools Questions
Example
If event chain leads to compromise
h t t p : / / l i a p o l a s e n s [ . ] i n f o / indexm . html
h t t p : / / l i a p o l a s e n s [ . ] i n f o / c o u n t e r . php ? t=f&v=win %2011 ,7 ,700 ,169& a=t r u e
h t t p : / / l i a p o l a s e n s [ . ] i n f o /354 RIcx
h t t p : / / l i a p o l a s e n s [ . ] i n f o /054 RIcx
What to do?
Incident Response tactics with Compromise Indicators Affilations: Academia Sinica, o0o.nu, chroot.org
Basics Standards Tools Sharing IOCs IOCs composites Case Study More on Tools Questions
Use YARA, or tune your own tools
r u l e susp_params_in_url_kind_of_fileless_bot_drive_by
{
meta :
date = " o c t ␣ 2013 "
d e s c r i p t i o n = " Landing ␣ hxxp : / / j d a t a s t o r e l a m e . i n f o / indexm . html ␣␣ 0 4 . 1 0 . 2 0 1 3 ␣ 1 3 : 1 4 ␣␣ 1 0 8 . 6
d e s c r i p t i o n 1 = "␣ Java ␣ S p l o i t ␣ hxxp : / / j d a t a s t o r e l a m e . i n f o /054 RIwj ␣␣␣␣␣"
s t r i n g s :
$ s t r i n g 0 = " h t t p "
$ s t r i n g 1 = " indexm . html "
$ s t r i n g 2 = " 054 RI "
c o n d i t i o n :
a l l o f them
}
Incident Response tactics with Compromise Indicators Affilations: Academia Sinica, o0o.nu, chroot.org
Basics Standards Tools Sharing IOCs IOCs composites Case Study More on Tools Questions
Use snort to catch suspicious traffic:
# many plugX d e p l o y m e n t s c o n n e c t to g o o g l e DNS when not i n use
a l e r t t c p ! $DNS_SERVERS any −> 8 . 8 . 8 . 8 53 ( msg : "APT␣ p o s s i b l e ␣ PlugX ␣ Google ␣DNS␣TCP
p o r t ␣53␣ c o n n e c t i o n ␣ attempt " ; c l a s s t y p e : misc−a c t i v i t y ; s i d : 5 0 0 0 0 0 1 1 2 ;
r e v : 1 ; )
Incident Response tactics with Compromise Indicators Affilations: Academia Sinica, o0o.nu, chroot.org
Basics Standards Tools Sharing IOCs IOCs composites Case Study More on Tools Questions
GRR: Google Rapid Response:
http://code.google.com/p/grr/
Hunting IOC artifacts with GRR
Incident Response tactics with Compromise Indicators Affilations: Academia Sinica, o0o.nu, chroot.org
Basics Standards Tools Sharing IOCs IOCs composites Case Study More on Tools Questions
GRR: Creating rules
Incident Response tactics with Compromise Indicators Affilations: Academia Sinica, o0o.nu, chroot.org
Basics Standards Tools Sharing IOCs IOCs composites Case Study More on Tools Questions
GRR: hunt in progress
Incident Response tactics with Compromise Indicators Affilations: Academia Sinica, o0o.nu, chroot.org
Basics Standards Tools Sharing IOCs IOCs composites Case Study More on Tools Questions
IOC management portal
Incident Response tactics with Compromise Indicators Affilations: Academia Sinica, o0o.nu, chroot.org
Basics Standards Tools Sharing IOCs IOCs composites Case Study More on Tools Questions
IOC exportable to json
{ " 8000 " : { " IP " : [ ’ 2 1 2 . 8 3 . 1 6 7 . 1 9 2 ’ , ’ 2 1 2 . 8 3 . 1 7 0 . 1 4 ’ , ’ 2 1 2 . 8 3 . 1 7 0 . 2 2 ’ , ’ 2 1 2 . 8 3 . 1 7 3 . 1 6 3 ’ , ’ 2 1
" f y f l a s h " : { " IP " : [ ’ 1 0 3 . 2 4 6 . 2 4 6 . 1 0 3 ’ , ’ 7 4 . 1 2 6 . 1 7 7 . 6 8 ’ , ’ 2 0 4 . 2 0 0 . 2 2 2 . 1 3 6 ’ , ’ 1 9 4 . 1 8 3 . 2 2 4 . 7 5 ’
’ 7 6 . 7 3 . 8 0 . 1 8 8 ’ , ’ 7 4 . 1 2 6 . 1 7 7 . 7 0 ’ , ’ 1 9 2 . 7 4 . 2 4 6 . 2 1 9 ’ , ’ 7 4 . 1 2 6 . 1 7 7 . 2 4 1 ’ ] ,
"Domain" : [ ’ wmi . ns01 . us ␣ ’ , ’ p r o x y . ddns . i n f o ␣ ’ , ’ windows . ddns . us ␣ ’ ,
’ m i c r o s a f e s . no−i p . org ␣ ’ , ’ f u c k c h i n a . govnb . com␣ ’ , ’ i d s . ns01 . us ␣ ’ ,
’ updatedns . ns01 . us ␣ ’ , ’ updatedns . ns02 . us ␣ ’ ,
’ a d s e r v i c e . no−i p . org ␣ ’ , ’ j a v a . ns1 . name␣ ’ ] ,
"MD5" : [ ’ 7 d810e3564c4eb95bcb3d11ce191208e ’ , ’ 1 ec5141051776ec9092db92050192758 ’ ] } ,
" b t c " : { " IP " : [ ’ 1 8 4 . 1 0 6 . 1 4 6 . 2 4 4 ’ ] } ,
" s l v b u s o " : { "MD5" : [ ’ 45645 F17E3B014B9BCE89A793F5775B2 ’ ] , "Domain" : [ ’ h e l l d a r k . b i z ’ ] } ,
" sp " : { " IP " : [ ’ 1 9 4 . 5 8 . 9 1 . 1 8 6 ’ , ’ 9 5 . 1 5 6 . 2 3 8 . 1 4 ’ , ’ 1 9 2 . 9 5 . 4 6 . 0 ’ , ’ 1 9 8 . 5 0 . 1 3 1 . 2 2 0 ’ , ’ 1 9 8 . 5 0 . 2 4
’ 1 9 8 . 5 0 . 1 4 0 . 7 2 ’ , ’ 9 5 . 1 5 6 . 2 3 8 . 5 ’ , ’ 1 9 2 . 9 5 . 4 6 . 2 5 ’ ] } ,
"pw" : { " IP " : [ ’ 1 8 5 . 8 . 1 0 6 . 9 7 ’ , ’ 1 9 5 . 2 . 2 5 3 . 2 5 ’ ] } ,
"sophMdropFQI " : { "MD5" : [ ’ c f 6 5 6 f d 9 f 8 3 9 a 5 c d 5 6 b b 9 9 9 1 9 7 7 4 5 a 4 9 ’ ] , "Domain" : [ ’ s a m i o l l o . org ’ ]
" symsr " : { " IP " : [ ’ 2 1 2 . 9 5 . 3 2 . 5 2 ’ , ’ 9 5 . 2 1 1 . 1 3 0 . 1 3 2 ’ , ’ 1 2 3 . 4 5 . 6 7 . 8 9 ’ ] ,
"Domain" : [ ’ w e r t d g h b y r u k l . ch ’ , ’ r g t r y h b g d d t y h . b i z ’ ] }
" f a k e i n s t r " : { " IP " : [ ’ 4 6 . 1 6 5 . 2 5 0 . 2 3 7 ’ , ’ 4 6 . 1 6 5 . 2 5 0 . 2 3 6 ’ , ’ 4 6 . 1 6 5 . 2 5 0 . 1 9 7 ’ ] } ,
" msProlaco " : { "Domain" : [ ’ k a t h e l l . com ’ , ’ c o g i n i x . org ’ ] } }
Incident Response tactics with Compromise Indicators Affilations: Academia Sinica, o0o.nu, chroot.org
Basics Standards Tools Sharing IOCs IOCs composites Case Study More on Tools Questions
and every manager loves graphs :p
Incident Response tactics with Compromise Indicators Affilations: Academia Sinica, o0o.nu, chroot.org
Basics Standards Tools Sharing IOCs IOCs composites Case Study More on Tools Questions
Q and A
Or contact us at . . .
Incident Response tactics with Compromise Indicators Affilations: Academia Sinica, o0o.nu, chroot.org

More Related Content

Similar to Incident Response Tactics with Compromise Indicators

Stuxnet redux. malware attribution & lessons learned
Stuxnet redux. malware attribution & lessons learnedStuxnet redux. malware attribution & lessons learned
Stuxnet redux. malware attribution & lessons learned
Yury Chemerkin
 
Ceh v8-course-outline
Ceh v8-course-outlineCeh v8-course-outline
Ceh v8-course-outline
Ayhan Gasanly
 
Ceh certified ethical hacker
Ceh   certified ethical hackerCeh   certified ethical hacker
Ceh certified ethical hacker
bestip
 
Advanced pc security final exam results
Advanced pc security final exam resultsAdvanced pc security final exam results
Advanced pc security final exam results
Dale Vick
 
03.fnc corporate protect workshop new
03.fnc corporate protect workshop new03.fnc corporate protect workshop new
03.fnc corporate protect workshop new
forensicsnation
 
FNC Corporate Protect Workshop
FNC Corporate Protect WorkshopFNC Corporate Protect Workshop
FNC Corporate Protect Workshop
forensicsnation
 

Similar to Incident Response Tactics with Compromise Indicators (20)

Intro2 malwareanalysisshort
Intro2 malwareanalysisshortIntro2 malwareanalysisshort
Intro2 malwareanalysisshort
 
Software Analytics: Towards Software Mining that Matters (2014)
Software Analytics:Towards Software Mining that Matters (2014)Software Analytics:Towards Software Mining that Matters (2014)
Software Analytics: Towards Software Mining that Matters (2014)
 
Reversing malware analysis trainingpart9 advanced malware analysis
Reversing malware analysis trainingpart9 advanced malware analysisReversing malware analysis trainingpart9 advanced malware analysis
Reversing malware analysis trainingpart9 advanced malware analysis
 
Stuxnet redux. malware attribution & lessons learned
Stuxnet redux. malware attribution & lessons learnedStuxnet redux. malware attribution & lessons learned
Stuxnet redux. malware attribution & lessons learned
 
Software Analytics: Data Analytics for Software Engineering and Security
Software Analytics: Data Analytics for Software Engineering and SecuritySoftware Analytics: Data Analytics for Software Engineering and Security
Software Analytics: Data Analytics for Software Engineering and Security
 
Ceh v8-course-outline
Ceh v8-course-outlineCeh v8-course-outline
Ceh v8-course-outline
 
Module 20 (buffer overflows)
Module 20 (buffer overflows)Module 20 (buffer overflows)
Module 20 (buffer overflows)
 
Fast and Generic Malware Triage Using openioc_scan Volatility Plugin
Fast and Generic Malware Triage Using openioc_scan Volatility PluginFast and Generic Malware Triage Using openioc_scan Volatility Plugin
Fast and Generic Malware Triage Using openioc_scan Volatility Plugin
 
Ceh certified ethical hacker
Ceh   certified ethical hackerCeh   certified ethical hacker
Ceh certified ethical hacker
 
IOCs Are Dead—Long Live IOCs!
IOCs Are Dead—Long Live IOCs!IOCs Are Dead—Long Live IOCs!
IOCs Are Dead—Long Live IOCs!
 
Advanced pc security final exam results
Advanced pc security final exam resultsAdvanced pc security final exam results
Advanced pc security final exam results
 
03.fnc corporate protect workshop new
03.fnc corporate protect workshop new03.fnc corporate protect workshop new
03.fnc corporate protect workshop new
 
FNC Corporate Protect
FNC Corporate ProtectFNC Corporate Protect
FNC Corporate Protect
 
FNC Corporate Protect Workshop
FNC Corporate Protect WorkshopFNC Corporate Protect Workshop
FNC Corporate Protect Workshop
 
Ethical hacking and countermeasures
Ethical hacking and countermeasuresEthical hacking and countermeasures
Ethical hacking and countermeasures
 
Become a Certified Ethical Hacker at Blitz Academy | Near Me
Become a Certified Ethical Hacker at Blitz Academy | Near MeBecome a Certified Ethical Hacker at Blitz Academy | Near Me
Become a Certified Ethical Hacker at Blitz Academy | Near Me
 
Open Source Insight: SCA for DevOps, DHS Security, Securing Open Source for G...
Open Source Insight: SCA for DevOps, DHS Security, Securing Open Source for G...Open Source Insight: SCA for DevOps, DHS Security, Securing Open Source for G...
Open Source Insight: SCA for DevOps, DHS Security, Securing Open Source for G...
 
Hitcon 2014: Surviving in tough Russian Environment
Hitcon 2014: Surviving in tough Russian EnvironmentHitcon 2014: Surviving in tough Russian Environment
Hitcon 2014: Surviving in tough Russian Environment
 
Resilience Engineering: A field of study, a community, and some perspective s...
Resilience Engineering: A field of study, a community, and some perspective s...Resilience Engineering: A field of study, a community, and some perspective s...
Resilience Engineering: A field of study, a community, and some perspective s...
 
BSides IR in Heterogeneous Environment
BSides IR in Heterogeneous EnvironmentBSides IR in Heterogeneous Environment
BSides IR in Heterogeneous Environment
 

More from F _ (11)

Rsa2016
Rsa2016Rsa2016
Rsa2016
 
Indicators of Compromise Magic: Living with compromise
Indicators of Compromise Magic: Living with compromiseIndicators of Compromise Magic: Living with compromise
Indicators of Compromise Magic: Living with compromise
 
whats wrong with modern security tools and other blurps
whats wrong with modern security tools and other blurpswhats wrong with modern security tools and other blurps
whats wrong with modern security tools and other blurps
 
Hunting The Shadows: In Depth Analysis of Escalated APT Attacks
Hunting The Shadows: In Depth Analysis of Escalated APT AttacksHunting The Shadows: In Depth Analysis of Escalated APT Attacks
Hunting The Shadows: In Depth Analysis of Escalated APT Attacks
 
Phd III - defending enterprise
Phd III - defending enterprise Phd III - defending enterprise
Phd III - defending enterprise
 
HITB2013AMS Defenting the enterprise, a russian way!
HITB2013AMS Defenting the enterprise, a russian way!HITB2013AMS Defenting the enterprise, a russian way!
HITB2013AMS Defenting the enterprise, a russian way!
 
Hitbkl 2012
Hitbkl 2012Hitbkl 2012
Hitbkl 2012
 
From russia final_bluehat10
From russia final_bluehat10From russia final_bluehat10
From russia final_bluehat10
 
Hacklu2012 v07
Hacklu2012 v07Hacklu2012 v07
Hacklu2012 v07
 
2011 hk fyodor-anthony_ppt
2011 hk fyodor-anthony_ppt2011 hk fyodor-anthony_ppt
2011 hk fyodor-anthony_ppt
 
0nights2011
0nights20110nights2011
0nights2011
 

Recently uploaded

pdfcoffee.com_business-ethics-q3m7-pdf-free.pdf
pdfcoffee.com_business-ethics-q3m7-pdf-free.pdfpdfcoffee.com_business-ethics-q3m7-pdf-free.pdf
pdfcoffee.com_business-ethics-q3m7-pdf-free.pdf
JOHNBEBONYAP1
 
Top profile Call Girls In Dindigul [ 7014168258 ] Call Me For Genuine Models ...
Top profile Call Girls In Dindigul [ 7014168258 ] Call Me For Genuine Models ...Top profile Call Girls In Dindigul [ 7014168258 ] Call Me For Genuine Models ...
Top profile Call Girls In Dindigul [ 7014168258 ] Call Me For Genuine Models ...
gajnagarg
 
一比一原版奥兹学院毕业证如何办理
一比一原版奥兹学院毕业证如何办理一比一原版奥兹学院毕业证如何办理
一比一原版奥兹学院毕业证如何办理
F
 
一比一原版田纳西大学毕业证如何办理
一比一原版田纳西大学毕业证如何办理一比一原版田纳西大学毕业证如何办理
一比一原版田纳西大学毕业证如何办理
F
 
一比一原版(Curtin毕业证书)科廷大学毕业证原件一模一样
一比一原版(Curtin毕业证书)科廷大学毕业证原件一模一样一比一原版(Curtin毕业证书)科廷大学毕业证原件一模一样
一比一原版(Curtin毕业证书)科廷大学毕业证原件一模一样
ayvbos
 
哪里办理美国迈阿密大学毕业证(本硕)umiami在读证明存档可查
哪里办理美国迈阿密大学毕业证(本硕)umiami在读证明存档可查哪里办理美国迈阿密大学毕业证(本硕)umiami在读证明存档可查
哪里办理美国迈阿密大学毕业证(本硕)umiami在读证明存档可查
ydyuyu
 
Russian Call girls in Abu Dhabi 0508644382 Abu Dhabi Call girls
Russian Call girls in Abu Dhabi 0508644382 Abu Dhabi Call girlsRussian Call girls in Abu Dhabi 0508644382 Abu Dhabi Call girls
Russian Call girls in Abu Dhabi 0508644382 Abu Dhabi Call girls
Monica Sydney
 
Russian Escort Abu Dhabi 0503464457 Abu DHabi Escorts
Russian Escort Abu Dhabi 0503464457 Abu DHabi EscortsRussian Escort Abu Dhabi 0503464457 Abu DHabi Escorts
Russian Escort Abu Dhabi 0503464457 Abu DHabi Escorts
Monica Sydney
 
一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制
一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制
一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制
pxcywzqs
 
Abu Dhabi Escorts Service 0508644382 Escorts in Abu Dhabi
Abu Dhabi Escorts Service 0508644382 Escorts in Abu DhabiAbu Dhabi Escorts Service 0508644382 Escorts in Abu Dhabi
Abu Dhabi Escorts Service 0508644382 Escorts in Abu Dhabi
Monica Sydney
 

Recently uploaded (20)

Tadepalligudem Escorts Service Girl ^ 9332606886, WhatsApp Anytime Tadepallig...
Tadepalligudem Escorts Service Girl ^ 9332606886, WhatsApp Anytime Tadepallig...Tadepalligudem Escorts Service Girl ^ 9332606886, WhatsApp Anytime Tadepallig...
Tadepalligudem Escorts Service Girl ^ 9332606886, WhatsApp Anytime Tadepallig...
 
Local Call Girls in Seoni 9332606886 HOT & SEXY Models beautiful and charmin...
Local Call Girls in Seoni  9332606886 HOT & SEXY Models beautiful and charmin...Local Call Girls in Seoni  9332606886 HOT & SEXY Models beautiful and charmin...
Local Call Girls in Seoni 9332606886 HOT & SEXY Models beautiful and charmin...
 
"Boost Your Digital Presence: Partner with a Leading SEO Agency"
"Boost Your Digital Presence: Partner with a Leading SEO Agency""Boost Your Digital Presence: Partner with a Leading SEO Agency"
"Boost Your Digital Presence: Partner with a Leading SEO Agency"
 
Call girls Service in Ajman 0505086370 Ajman call girls
Call girls Service in Ajman 0505086370 Ajman call girlsCall girls Service in Ajman 0505086370 Ajman call girls
Call girls Service in Ajman 0505086370 Ajman call girls
 
pdfcoffee.com_business-ethics-q3m7-pdf-free.pdf
pdfcoffee.com_business-ethics-q3m7-pdf-free.pdfpdfcoffee.com_business-ethics-q3m7-pdf-free.pdf
pdfcoffee.com_business-ethics-q3m7-pdf-free.pdf
 
2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs
2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs
2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs
 
Top profile Call Girls In Dindigul [ 7014168258 ] Call Me For Genuine Models ...
Top profile Call Girls In Dindigul [ 7014168258 ] Call Me For Genuine Models ...Top profile Call Girls In Dindigul [ 7014168258 ] Call Me For Genuine Models ...
Top profile Call Girls In Dindigul [ 7014168258 ] Call Me For Genuine Models ...
 
一比一原版奥兹学院毕业证如何办理
一比一原版奥兹学院毕业证如何办理一比一原版奥兹学院毕业证如何办理
一比一原版奥兹学院毕业证如何办理
 
一比一原版田纳西大学毕业证如何办理
一比一原版田纳西大学毕业证如何办理一比一原版田纳西大学毕业证如何办理
一比一原版田纳西大学毕业证如何办理
 
Mira Road Housewife Call Girls 07506202331, Nalasopara Call Girls
Mira Road Housewife Call Girls 07506202331, Nalasopara Call GirlsMira Road Housewife Call Girls 07506202331, Nalasopara Call Girls
Mira Road Housewife Call Girls 07506202331, Nalasopara Call Girls
 
一比一原版(Curtin毕业证书)科廷大学毕业证原件一模一样
一比一原版(Curtin毕业证书)科廷大学毕业证原件一模一样一比一原版(Curtin毕业证书)科廷大学毕业证原件一模一样
一比一原版(Curtin毕业证书)科廷大学毕业证原件一模一样
 
Nagercoil Escorts Service Girl ^ 9332606886, WhatsApp Anytime Nagercoil
Nagercoil Escorts Service Girl ^ 9332606886, WhatsApp Anytime NagercoilNagercoil Escorts Service Girl ^ 9332606886, WhatsApp Anytime Nagercoil
Nagercoil Escorts Service Girl ^ 9332606886, WhatsApp Anytime Nagercoil
 
APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...
APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...
APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...
 
Meaning of On page SEO & its process in detail.
Meaning of On page SEO & its process in detail.Meaning of On page SEO & its process in detail.
Meaning of On page SEO & its process in detail.
 
哪里办理美国迈阿密大学毕业证(本硕)umiami在读证明存档可查
哪里办理美国迈阿密大学毕业证(本硕)umiami在读证明存档可查哪里办理美国迈阿密大学毕业证(本硕)umiami在读证明存档可查
哪里办理美国迈阿密大学毕业证(本硕)umiami在读证明存档可查
 
Russian Call girls in Abu Dhabi 0508644382 Abu Dhabi Call girls
Russian Call girls in Abu Dhabi 0508644382 Abu Dhabi Call girlsRussian Call girls in Abu Dhabi 0508644382 Abu Dhabi Call girls
Russian Call girls in Abu Dhabi 0508644382 Abu Dhabi Call girls
 
Russian Escort Abu Dhabi 0503464457 Abu DHabi Escorts
Russian Escort Abu Dhabi 0503464457 Abu DHabi EscortsRussian Escort Abu Dhabi 0503464457 Abu DHabi Escorts
Russian Escort Abu Dhabi 0503464457 Abu DHabi Escorts
 
一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制
一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制
一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制
 
Abu Dhabi Escorts Service 0508644382 Escorts in Abu Dhabi
Abu Dhabi Escorts Service 0508644382 Escorts in Abu DhabiAbu Dhabi Escorts Service 0508644382 Escorts in Abu Dhabi
Abu Dhabi Escorts Service 0508644382 Escorts in Abu Dhabi
 
Best SEO Services Company in Dallas | Best SEO Agency Dallas
Best SEO Services Company in Dallas | Best SEO Agency DallasBest SEO Services Company in Dallas | Best SEO Agency Dallas
Best SEO Services Company in Dallas | Best SEO Agency Dallas
 

Incident Response Tactics with Compromise Indicators

  • 1. Basics Standards Tools Sharing IOCs IOCs composites Case Study More on Tools Questions Incident Response tactics with Compromise Indicators Vladimir Kropotov, Vitaly Chetvertakov, Fyodor Yarochkin RusCrypto 2014 Affilations: Academia Sinica, o0o.nu, chroot.org March 25-28, 2014 Incident Response tactics with Compromise Indicators Affilations: Academia Sinica, o0o.nu, chroot.org
  • 2. Basics Standards Tools Sharing IOCs IOCs composites Case Study More on Tools Questions Outline Basics Standards Tools Sharing IOCs IOCs composites Case Study More on Tools Questions Incident Response tactics with Compromise Indicators Affilations: Academia Sinica, o0o.nu, chroot.org
  • 3. Basics Standards Tools Sharing IOCs IOCs composites Case Study More on Tools Questions Introduction Indicators of Compromise Indicator of compromise (IOC) in computer forensics is an artifact observed on network or in operating system that with high confidence indicates a computer intrusion. http://en.wikipedia.org/wiki/Indicator_of_compromise Incident Response tactics with Compromise Indicators Affilations: Academia Sinica, o0o.nu, chroot.org
  • 4. Basics Standards Tools Sharing IOCs IOCs composites Case Study More on Tools Questions IOC workflow A typical flow with Indicators of Compromise: source: Sophisticated indicators for the modern threat landscape, 2012 paper Incident Response tactics with Compromise Indicators Affilations: Academia Sinica, o0o.nu, chroot.org
  • 5. Basics Standards Tools Sharing IOCs IOCs composites Case Study More on Tools Questions Standards: OpenIOC OpenIOC - Mandiant-backed effort for unform representation of IOC (now FireEye) http://www.openioc.org/ Incident Response tactics with Compromise Indicators Affilations: Academia Sinica, o0o.nu, chroot.org
  • 6. Basics Standards Tools Sharing IOCs IOCs composites Case Study More on Tools Questions Standards: Mitre Mitre CybOX: http://cybox.mitre.org/ https://github.com/CybOXProject/Tools https://github.com/CybOXProject/openioc-to-cybox Mitre CAPEC: http://capec.mitre.org/ Mitre STIX: http://stix.mitre.org/ Mitre TAXII http://taxii.mitre.org/ Incident Response tactics with Compromise Indicators Affilations: Academia Sinica, o0o.nu, chroot.org
  • 7. Basics Standards Tools Sharing IOCs IOCs composites Case Study More on Tools Questions Open-source tools OpenIOC manipulation https://github.com/STIXProject/openioc-to-stix https://github.com/tklane/openiocscripts Mantis Threat Intelligence Framework https://github.com/siemens/django-mantis.git Mantis supports STIX/CybOX/IODEF/OpenIOC etc via importers: https://github.com/siemens/django-mantis-openioc-importer Search splunk data for IOC indicators: https://github.com/technoskald/splunk-search Our framework: http://github.com/fygrave/iocmap/ Incident Response tactics with Compromise Indicators Affilations: Academia Sinica, o0o.nu, chroot.org
  • 8. Basics Standards Tools Sharing IOCs IOCs composites Case Study More on Tools Questions Online Sharing of IOCs http://iocbucket.com/ Incident Response tactics with Compromise Indicators Affilations: Academia Sinica, o0o.nu, chroot.org
  • 9. Basics Standards Tools Sharing IOCs IOCs composites Case Study More on Tools Questions Policies on Sharing Policies on sharing IOCs: what to be shared/can be shared who to share with when to share Incident Response tactics with Compromise Indicators Affilations: Academia Sinica, o0o.nu, chroot.org
  • 10. Basics Standards Tools Sharing IOCs IOCs composites Case Study More on Tools Questions Where to look for IOCs: Outbound Network Traffic User Activities/Failed Logins User profile folders Administrative Access Access from unsual IP addresses Database IO: excessive READs Size of responses of web pages Unusual access to particular files within Web Application (backdoor) Unusual port/protocol connections DNS and HTTP traffic requests Suspicious Scripts, Executables and Data Files Incident Response tactics with Compromise Indicators Affilations: Academia Sinica, o0o.nu, chroot.org
  • 11. Basics Standards Tools Sharing IOCs IOCs composites Case Study More on Tools Questions Challenges Why we need IOCs? because it makes it easier to systematically describe knowledge about breaches. Identifying intrusions is hard Unfair game: defender should protect all the assets attacker only needs to ’poop’ one system. Identifying targeted, organized intrusions is even harder Minor anomalous events are important when put together Seeing global picture is a mast Details matter Attribution is hard Incident Response tactics with Compromise Indicators Affilations: Academia Sinica, o0o.nu, chroot.org
  • 12. Basics Standards Tools Sharing IOCs IOCs composites Case Study More on Tools Questions Challenges All networks are compromised The difference between a good security team and a bad security team is that with a bad security team you will never know that you’ve been compromised. Incident Response tactics with Compromise Indicators Affilations: Academia Sinica, o0o.nu, chroot.org
  • 13. Basics Standards Tools Sharing IOCs IOCs composites Case Study More on Tools Questions An Example A Network compromise case study: Attackers broke via a web vuln. Attackers gained local admin access Attackers created a local user Attackers started probing other machines for default user ids Attackers launched tunneling tools – connecting back to C2 Attackers installed RATs to maintain access Incident Response tactics with Compromise Indicators Affilations: Academia Sinica, o0o.nu, chroot.org
  • 14. Basics Standards Tools Sharing IOCs IOCs composites Case Study More on Tools Questions Indicators So what are the compromise indicators here? Where did attackers come from? (IP) What vulnerability was exploited? (pattern) What web backdoor was used? (pattern, hash) What tools were uploaded? (hashes) What users were created locally? (username) What usernames were probed on other machines Incident Response tactics with Compromise Indicators Affilations: Academia Sinica, o0o.nu, chroot.org
  • 15. Basics Standards Tools Sharing IOCs IOCs composites Case Study More on Tools Questions Good or Bad? F i l e Name : RasTls . exe F i l e S i z e : 105 kB F i l e M o d i f i c a t i o n Date /Time : 2 0 0 9 : 0 2 : 0 9 1 9 : 4 2 : 0 5 + 0 8 : 0 0 F i l e Type : Win32 EXE MIME Type : a p p l i c a t i o n / o c t e t −stream Machine Type : I n t e l 386 o r l a t e r , and c o m p a t i b l e s Time Stamp : 2 0 0 9 : 0 2 : 0 2 1 3 : 3 8 : 3 7 + 0 8 : 0 0 PE Type : PE32 L i n k e r V e r s i o n : 8 . 0 Code S i z e : 49152 I n i t i a l i z e d Data S i z e : 57344 U n i n i t i a l i z e d Data S i z e : 0 Entry P o i n t : 0 x3d76 OS V e r s i o n : 4 . 0 Image V e r s i o n : 0 . 0 Subsystem V e r s i o n : 4 . 0 Subsystem : Windows GUI F i l e V e r s i o n Number : 1 1 . 0 . 4 0 1 0 . 7 Product V e r s i o n Number : 1 1 . 0 . 4 0 1 0 . 7 F i l e OS : Windows NT 32− b i t Object F i l e Type : E x e c u t a b l e a p p l i c a t i o n Language Code : E n g l i s h (U . S . ) C h a r a c t e r Set : Windows , L a t i n 1 Company Name : Symantec C o r p o r a t i o n F i l e D e s c r i p t i o n : Symantec 8 0 2 . 1 x S u p p l i c a n t F i l e V e r s i o n : 1 1 . 0 . 4 0 1 0 . 7 I n t e r n a l Name : d o t 1 x t r a y Incident Response tactics with Compromise Indicators Affilations: Academia Sinica, o0o.nu, chroot.org
  • 16. Basics Standards Tools Sharing IOCs IOCs composites Case Study More on Tools Questions It really depends on context RasTls . DLL RasTls . DLL . msc RasTls . exe http://msdn.microsoft.com/en-us/library/ms682586(v=VS.85).aspx Dynamic-Link Library Search Order Incident Response tactics with Compromise Indicators Affilations: Academia Sinica, o0o.nu, chroot.org
  • 17. Basics Standards Tools Sharing IOCs IOCs composites Case Study More on Tools Questions Tools for Dynamic Detection of IOC Snort Yara + yara-enabled tools Moloch Splunk/Log search Incident Response tactics with Compromise Indicators Affilations: Academia Sinica, o0o.nu, chroot.org
  • 18. Basics Standards Tools Sharing IOCs IOCs composites Case Study More on Tools Questions Tools for Dynamic Detection Moloch Moloch supports Yara (IOCs can be directly applied) Moloch has tagger plugin: # tagger . so # p r o v i d e s a b i l i t y to import t e x t f i l e s with IP and/ or hostn # i n t o a sensor that would cause autotagging of a l l matching p l u g i n s=tagger . so t a g g e r I p F i l e s=b l a c k l i s t , tag , tag , tag . . . taggerDomainFiles=domainbasedblacklists , tag , tag , tag Incident Response tactics with Compromise Indicators Affilations: Academia Sinica, o0o.nu, chroot.org
  • 19. Basics Standards Tools Sharing IOCs IOCs composites Case Study More on Tools Questions Sources of IOCs ioc bucket: http://iocbucket.com Public blacklists/trackers could also be used as source: https: //zeustracker.abuse.ch/blocklist.php?download=ipblocklist https: //zeustracker.abuse.ch/blocklist.php?download=domainblocklist Eset IOC repository https://github.com/eset/malware-ioc more coming? Incident Response tactics with Compromise Indicators Affilations: Academia Sinica, o0o.nu, chroot.org
  • 20. Basics Standards Tools Sharing IOCs IOCs composites Case Study More on Tools Questions where to mine IOC passive HTTP (keep your data recorded) passive DNS These platforms provide ability to mine traffic or patterns from the past based on IOC similarity show me all the packets similar to this IOC We implemented a whois service for IOC look-ups whois −h i o c . host . com a t t r i b u t e : value+a t t r i b u t e : value Incident Response tactics with Compromise Indicators Affilations: Academia Sinica, o0o.nu, chroot.org
  • 21. Basics Standards Tools Sharing IOCs IOCs composites Case Study More on Tools Questions Mining IOCs from your own data find and investigate incident Or even read paper determine indicators and test it in YOUR Environment use new indicators in the future see IOC cycle we mentioned earlier Incident Response tactics with Compromise Indicators Affilations: Academia Sinica, o0o.nu, chroot.org
  • 22. Basics Standards Tools Sharing IOCs IOCs composites Case Study More on Tools Questions Example If event chain leads to compromise h t t p : / / l i a p o l a s e n s [ . ] i n f o / indexm . html h t t p : / / l i a p o l a s e n s [ . ] i n f o / c o u n t e r . php ? t=f&v=win %2011 ,7 ,700 ,169& a=t r u e h t t p : / / l i a p o l a s e n s [ . ] i n f o /354 RIcx h t t p : / / l i a p o l a s e n s [ . ] i n f o /054 RIcx What to do? Incident Response tactics with Compromise Indicators Affilations: Academia Sinica, o0o.nu, chroot.org
  • 23. Basics Standards Tools Sharing IOCs IOCs composites Case Study More on Tools Questions Use YARA, or tune your own tools r u l e susp_params_in_url_kind_of_fileless_bot_drive_by { meta : date = " o c t ␣ 2013 " d e s c r i p t i o n = " Landing ␣ hxxp : / / j d a t a s t o r e l a m e . i n f o / indexm . html ␣␣ 0 4 . 1 0 . 2 0 1 3 ␣ 1 3 : 1 4 ␣␣ 1 0 8 . 6 d e s c r i p t i o n 1 = "␣ Java ␣ S p l o i t ␣ hxxp : / / j d a t a s t o r e l a m e . i n f o /054 RIwj ␣␣␣␣␣" s t r i n g s : $ s t r i n g 0 = " h t t p " $ s t r i n g 1 = " indexm . html " $ s t r i n g 2 = " 054 RI " c o n d i t i o n : a l l o f them } Incident Response tactics with Compromise Indicators Affilations: Academia Sinica, o0o.nu, chroot.org
  • 24. Basics Standards Tools Sharing IOCs IOCs composites Case Study More on Tools Questions Use snort to catch suspicious traffic: # many plugX d e p l o y m e n t s c o n n e c t to g o o g l e DNS when not i n use a l e r t t c p ! $DNS_SERVERS any −> 8 . 8 . 8 . 8 53 ( msg : "APT␣ p o s s i b l e ␣ PlugX ␣ Google ␣DNS␣TCP p o r t ␣53␣ c o n n e c t i o n ␣ attempt " ; c l a s s t y p e : misc−a c t i v i t y ; s i d : 5 0 0 0 0 0 1 1 2 ; r e v : 1 ; ) Incident Response tactics with Compromise Indicators Affilations: Academia Sinica, o0o.nu, chroot.org
  • 25. Basics Standards Tools Sharing IOCs IOCs composites Case Study More on Tools Questions GRR: Google Rapid Response: http://code.google.com/p/grr/ Hunting IOC artifacts with GRR Incident Response tactics with Compromise Indicators Affilations: Academia Sinica, o0o.nu, chroot.org
  • 26. Basics Standards Tools Sharing IOCs IOCs composites Case Study More on Tools Questions GRR: Creating rules Incident Response tactics with Compromise Indicators Affilations: Academia Sinica, o0o.nu, chroot.org
  • 27. Basics Standards Tools Sharing IOCs IOCs composites Case Study More on Tools Questions GRR: hunt in progress Incident Response tactics with Compromise Indicators Affilations: Academia Sinica, o0o.nu, chroot.org
  • 28. Basics Standards Tools Sharing IOCs IOCs composites Case Study More on Tools Questions IOC management portal Incident Response tactics with Compromise Indicators Affilations: Academia Sinica, o0o.nu, chroot.org
  • 29. Basics Standards Tools Sharing IOCs IOCs composites Case Study More on Tools Questions IOC exportable to json { " 8000 " : { " IP " : [ ’ 2 1 2 . 8 3 . 1 6 7 . 1 9 2 ’ , ’ 2 1 2 . 8 3 . 1 7 0 . 1 4 ’ , ’ 2 1 2 . 8 3 . 1 7 0 . 2 2 ’ , ’ 2 1 2 . 8 3 . 1 7 3 . 1 6 3 ’ , ’ 2 1 " f y f l a s h " : { " IP " : [ ’ 1 0 3 . 2 4 6 . 2 4 6 . 1 0 3 ’ , ’ 7 4 . 1 2 6 . 1 7 7 . 6 8 ’ , ’ 2 0 4 . 2 0 0 . 2 2 2 . 1 3 6 ’ , ’ 1 9 4 . 1 8 3 . 2 2 4 . 7 5 ’ ’ 7 6 . 7 3 . 8 0 . 1 8 8 ’ , ’ 7 4 . 1 2 6 . 1 7 7 . 7 0 ’ , ’ 1 9 2 . 7 4 . 2 4 6 . 2 1 9 ’ , ’ 7 4 . 1 2 6 . 1 7 7 . 2 4 1 ’ ] , "Domain" : [ ’ wmi . ns01 . us ␣ ’ , ’ p r o x y . ddns . i n f o ␣ ’ , ’ windows . ddns . us ␣ ’ , ’ m i c r o s a f e s . no−i p . org ␣ ’ , ’ f u c k c h i n a . govnb . com␣ ’ , ’ i d s . ns01 . us ␣ ’ , ’ updatedns . ns01 . us ␣ ’ , ’ updatedns . ns02 . us ␣ ’ , ’ a d s e r v i c e . no−i p . org ␣ ’ , ’ j a v a . ns1 . name␣ ’ ] , "MD5" : [ ’ 7 d810e3564c4eb95bcb3d11ce191208e ’ , ’ 1 ec5141051776ec9092db92050192758 ’ ] } , " b t c " : { " IP " : [ ’ 1 8 4 . 1 0 6 . 1 4 6 . 2 4 4 ’ ] } , " s l v b u s o " : { "MD5" : [ ’ 45645 F17E3B014B9BCE89A793F5775B2 ’ ] , "Domain" : [ ’ h e l l d a r k . b i z ’ ] } , " sp " : { " IP " : [ ’ 1 9 4 . 5 8 . 9 1 . 1 8 6 ’ , ’ 9 5 . 1 5 6 . 2 3 8 . 1 4 ’ , ’ 1 9 2 . 9 5 . 4 6 . 0 ’ , ’ 1 9 8 . 5 0 . 1 3 1 . 2 2 0 ’ , ’ 1 9 8 . 5 0 . 2 4 ’ 1 9 8 . 5 0 . 1 4 0 . 7 2 ’ , ’ 9 5 . 1 5 6 . 2 3 8 . 5 ’ , ’ 1 9 2 . 9 5 . 4 6 . 2 5 ’ ] } , "pw" : { " IP " : [ ’ 1 8 5 . 8 . 1 0 6 . 9 7 ’ , ’ 1 9 5 . 2 . 2 5 3 . 2 5 ’ ] } , "sophMdropFQI " : { "MD5" : [ ’ c f 6 5 6 f d 9 f 8 3 9 a 5 c d 5 6 b b 9 9 9 1 9 7 7 4 5 a 4 9 ’ ] , "Domain" : [ ’ s a m i o l l o . org ’ ] " symsr " : { " IP " : [ ’ 2 1 2 . 9 5 . 3 2 . 5 2 ’ , ’ 9 5 . 2 1 1 . 1 3 0 . 1 3 2 ’ , ’ 1 2 3 . 4 5 . 6 7 . 8 9 ’ ] , "Domain" : [ ’ w e r t d g h b y r u k l . ch ’ , ’ r g t r y h b g d d t y h . b i z ’ ] } " f a k e i n s t r " : { " IP " : [ ’ 4 6 . 1 6 5 . 2 5 0 . 2 3 7 ’ , ’ 4 6 . 1 6 5 . 2 5 0 . 2 3 6 ’ , ’ 4 6 . 1 6 5 . 2 5 0 . 1 9 7 ’ ] } , " msProlaco " : { "Domain" : [ ’ k a t h e l l . com ’ , ’ c o g i n i x . org ’ ] } } Incident Response tactics with Compromise Indicators Affilations: Academia Sinica, o0o.nu, chroot.org
  • 30. Basics Standards Tools Sharing IOCs IOCs composites Case Study More on Tools Questions and every manager loves graphs :p Incident Response tactics with Compromise Indicators Affilations: Academia Sinica, o0o.nu, chroot.org
  • 31. Basics Standards Tools Sharing IOCs IOCs composites Case Study More on Tools Questions Q and A Or contact us at . . . Incident Response tactics with Compromise Indicators Affilations: Academia Sinica, o0o.nu, chroot.org