SlideShare a Scribd company logo
1 of 46
malware analysis
for the enterprise
jason ross
yesterday: “impenetrable defense”
today: tourist attraction
obligatory narcissism
• worked in IT security for > 10 years
• employed with the BT ethical hacking team
• contribute to various malware research
groups & internet security communities
• PoC for the 585 defcon group
what are we
talking about? we are awesome at compliance!
• do you know when a host is
compromised?
• can you tell if other hosts were?
• what data was taken?
• do you have any idea where it
went?
so why are we getting owned?
because the current security
mindset sucks.
compliance != security
• we’re not getting better at securing
systems
• we are becoming adept at evading
the average security auditor.
"has data loss jumped the shark?"
Despite the statements in the prior slide,
we are seeing a decrease in data loss incidents
owned != dataloss
• Websense states in their 2009 Q1 "State
of the Internet” report :
– 671% growth in malicious web sites in the
past year.
– 77% of these were legitimate sites that had
been compromised.
what does that mean?
they may be looking to
use your brand image.
the intended victim may
not even be your
customer.
attackers may not be
interested in your data
at all.
arms race ++
industry:
let’s use signatures!
malware:
i can has packing,
crypto, and some
polymorphism?
protection fail.
heuristics won't save you
• they can be useful and effective
• they miss things
• especially if multiple stages are involved
some ways malware defeats AV
• encrypt the code with strong ciphers and
randomized keys
• alter the codebase in an automated fashion
(polymorphism)
• pack the executable
the state of anti-malware is abysmal
• examples of suckage:
• different signatures for the same
malware.
• vendors can't even agree on a name!
reactive technology is, by definition,
not going to be securing proactively.
but…
my
AV
suite
alerts
me
constantly!
think about that for a minute…
at least AV is catching stuff.
that's good, right?
the host was probably compromised
before AV caught whatever it alerted on.
that’s because malware does not infect a
host using a single stage process.
prepare for HolyCrap!
how malware works (really!)
image taken from the FireEye Research Blog:
http://blog.fireeye.com/research/2009/04/botnetweb.html
it's a business, not a kiddie
• payroll
• support models
• distribution channels
• strategic partnerships
downloads & droppers & rootkits, oh my!
• stage one: drive-by download
• stage two: load more malware
• stage three: profit!
pfft. only mom & pop sites are
being used for droppers, right?
um. wow. that sucks.
• yes. yes it does.
• still think you’re safe because IDS, AV, or
even a QSA says so?
• that’s OK, so did these guys:
current (2009) US population : 307 million
records lost by these companies : 264 million
percentage of population “owned” : ~86 %
more lessons from heartland
• malcode authors are invested in
long term solutions
• malware is increasingly targeted
scary example time
• URLZone
– My balance is fine!
• Monkif / DIKhora
– Nothing here but us JPEGs
where does malware
analysis fit in?
• virus protection is familiar to us
• as a result, we treat infection casually
• a virus alert is a security incident
• does your incident response policy
address virus alerts?
a clever transitional slide
• malware is bad
• analyzing it is necessary
• how do we do that?
– static analysis
– run-time analysis
sandnets
playing with
fire is cool!
what is a sandnet?
• a test environment using
multiple hosts
• isolated from the production
network
• used to analyze malicious
software
what are the options?
• online labs
• virtual machines
• bare metal
online labs
• convenient
• little skill required
• may not be comprehensive
• may be problematic from a security POV
roll your own
• more comprehensive
• potentially less problematic
• more expensive
• harder
vm, or bare metal?
• vm is cheaper & more efficient
• bare metal may be more accurate
jumping the sharK!
(demo of sharK 3.1)
how many hosts?
• At least 2 probably
– Victim
– Services / Monitoring
> VBoxManage list vms
"linux" {ad59f194-585e-49c5-a54c-5e92322b1188}
"winxp_sp3_01" {7a554f4e-6aea-42f1-a3c5-488d43f161ff}
network configuration
• isolated from production networks
– including the Internet
• but the multi-stage download process
requires access to malicious servers
haven't found a "good" solution for that yet
(IPS on outbound traffic?)
use the internal network feature
> VBoxManage showvminfo winxp_sp3_01
Name: winxp_sp3_01
Guest OS: Windows XP
UUID: 7a554f4e-6aea-42f1-a3c5-488d43f161ff
Memory size: 512MB
VRAM size: 12MB
Number of CPUs: 1
NIC 1: MAC: 080027D32767,
Attachment: Internal Network 'intnet'
dhcp - because dynamic is easy
> VBoxManage dhcpserver add
--netname intnet
--ip 192.168.3.1
--netmask 255.255.255.0
--lowerip 192.168.3.100
--upperip 192.168.3.250
--enable
monitoring traffic
• let the VM do the work for you
> VBoxManage modifyvm xp_victim --nictrace1
on --nictracefile1 “C:UsersTestlinux.pcap”
dns - all your zones…
• configured to be SOA for *
• returns the IP of the monitoring
host for all resource requests
Remember the MX
db.wildcard
$TTL 604800
@ IN SOA localhost. root.localhost. (
2010012201 ; serial
604800 ; refresh
86400 ; retry
2419200 ; expire
604800) ; negative
cache ttl
@ IN NS localhost.
* IN MX 10 mail.
* IN A 192.168.3.101
apache configuration
• mod_forensic is your friend
• configuration is easy:
ForensicLog /var/log/apache2/forensic_log
• Enable and reload:
# a2enmod log_forensic
# apache2ctl reload
sample forensic log
+2021:4adf8568:0
|GET / HTTP/1.1
|Accept:*/*
|Accept-Language:en-us
|Accept-Encoding:gzip, deflate
|User-Agent:Mozilla/4.0
(compatible; MSIE 6.0;
Windows NT 5.1; SV1)
|Host:192.168.3.101
|Connection:Keep-Alive
|Cache-Control:no-cache
-2021:4adf8568:0
directly you’ll be directed in the right direction
• configure apache to redirect all incoming
requests to a known page:
Redirect /* /index.html
ErrorDocument 404 /index.html
fun with netcat
• very easy to set up:
# netcat –nvlp 8080 –o tcp_8080.txt
< 00000000 47 45 54 20 2f 20 48 54 54 50 2f 31 2e 31 0d 0a # GET / HTTP/1.1..
< 00000010 41 63 63 65 70 74 3a 20 69 6d 61 67 65 2f 67 69 # Accept: image/gi
< 00000020 66 2c 20 69 6d 61 67 65 2f 78 2d 78 62 69 74 6d # f, image/x-xbitm
< 00000030 61 70 2c 20 69 6d 61 67 65 2f 6a 70 65 67 2c 20 # ap, image/jpeg,
< 00000040 69 6d 61 67 65 2f 70 6a 70 65 67 2c 20 61 70 70 # image/pjpeg, app
< 00000050 6c 69 63 61 74 69 6f 6e 2f 78 2d 73 68 6f 63 6b # lication/x-shock
< 00000060 77 61 76 65 2d 66 6c 61 73 68 2c 20 2a 2f 2a 0d # wave-flash, */*.
< 00000070 0a 41 63 63 65 70 74 2d 4c 61 6e 67 75 61 67 65 # .Accept-Language
< 00000080 3a 20 65 6e 2d 75 73 0d 0a 41 63 63 65 70 74 2d # : en-us..Accept-
< 00000090 45 6e 63 6f 64 69 6e 67 3a 20 67 7a 69 70 2c 20 # Encoding: gzip,
< 000000a0 64 65 66 6c 61 74 65 0d 0a 55 73 65 72 2d 41 67 # deflate..User-Ag
< 000000b0 65 6e 74 3a 20 4d 6f 7a 69 6c 6c 61 2f 34 2e 30 # ent: Mozilla/4.0
< 000000c0 20 28 63 6f 6d 70 61 74 69 62 6c 65 3b 20 4d 53 # (compatible; MS
< 000000d0 49 45 20 36 2e 30 3b 20 57 69 6e 64 6f 77 73 20 # IE 6.0; Windows
< 000000e0 4e 54 20 35 2e 31 3b 20 53 56 31 29 0d 0a 48 6f # NT 5.1; SV1)..Ho
< 000000f0 73 74 3a 20 31 39 32 2e 31 36 38 2e 33 2e 31 30 # st: 192.168.3.10
< 00000100 31 3a 38 30 38 30 0d 0a 43 6f 6e 6e 65 63 74 69 # 1:8080..Connecti
< 00000110 6f 6e 3a 20 4b 65 65 70 2d 41 6c 69 76 65 0d 0a # on: Keep-Alive..
< 00000120 0d 0a # ..
javascript de-obfuscation
• SpiderMonkey rules
• biggest issue is no ‘document’ object
• Didier Stevens’ port is even better
– adds features specific to malware
analysis
– including document.write()
victim host
• iDefense malcode analyst pack
• Regshot
• strings
• wireshark
Demo!
online resources
Anubis:
http://anubis.iseclab.org/
Virus Total
http://www.virustotal.com/
CERT.at Do-It-Yourself Kit
http://cert.at/downloads/papers/mass_malw
are_analysis_en.html
the end
algorythm@gmail.com
if you want to contact me for
some crazy reason, here's how you can:
https://twitter.com/rossja

More Related Content

What's hot

[CB16] Facebook Malware: Tag Me If You Can by Ido Naor & Dani Goland
[CB16] Facebook Malware: Tag Me If You Can by Ido Naor & Dani Goland[CB16] Facebook Malware: Tag Me If You Can by Ido Naor & Dani Goland
[CB16] Facebook Malware: Tag Me If You Can by Ido Naor & Dani GolandCODE BLUE
 
Lares from LOW to PWNED
Lares from LOW to PWNEDLares from LOW to PWNED
Lares from LOW to PWNEDChris Gates
 
BlueHat v17 || Wannacrypt + Smbv1.0 Vulnerability = One of the Most Damaging ...
BlueHat v17 || Wannacrypt + Smbv1.0 Vulnerability = One of the Most Damaging ...BlueHat v17 || Wannacrypt + Smbv1.0 Vulnerability = One of the Most Damaging ...
BlueHat v17 || Wannacrypt + Smbv1.0 Vulnerability = One of the Most Damaging ...BlueHat Security Conference
 
BlueHat v17 || Where, how, and why is SSL traffic on mobile getting intercept...
BlueHat v17 || Where, how, and why is SSL traffic on mobile getting intercept...BlueHat v17 || Where, how, and why is SSL traffic on mobile getting intercept...
BlueHat v17 || Where, how, and why is SSL traffic on mobile getting intercept...BlueHat Security Conference
 
Breaking Vaults - Stealing Lastpass Protected Secrets by Martin Vigo
Breaking Vaults - Stealing Lastpass Protected Secrets by Martin VigoBreaking Vaults - Stealing Lastpass Protected Secrets by Martin Vigo
Breaking Vaults - Stealing Lastpass Protected Secrets by Martin VigoShakacon
 
Defcon 22-metacortex-grifter-darkside-of-the-internet
Defcon 22-metacortex-grifter-darkside-of-the-internetDefcon 22-metacortex-grifter-darkside-of-the-internet
Defcon 22-metacortex-grifter-darkside-of-the-internetPriyanka Aash
 
Internal Pentest: from z3r0 to h3r0
Internal Pentest: from z3r0 to h3r0Internal Pentest: from z3r0 to h3r0
Internal Pentest: from z3r0 to h3r0marcioalma
 
DEF CON 27 - ORANGE TSAI and MEH CHANG - infiltrating corporate intranet like...
DEF CON 27 - ORANGE TSAI and MEH CHANG - infiltrating corporate intranet like...DEF CON 27 - ORANGE TSAI and MEH CHANG - infiltrating corporate intranet like...
DEF CON 27 - ORANGE TSAI and MEH CHANG - infiltrating corporate intranet like...Felipe Prado
 
hackcon2013-Dirty Little Secrets They Didn't Teach You In Pentesting Class v2
hackcon2013-Dirty Little Secrets They Didn't Teach You In Pentesting Class v2hackcon2013-Dirty Little Secrets They Didn't Teach You In Pentesting Class v2
hackcon2013-Dirty Little Secrets They Didn't Teach You In Pentesting Class v2Chris Gates
 
Big Bang Theory: The Evolution of Pentesting High Security Enviroments IT Def...
Big Bang Theory: The Evolution of Pentesting High Security Enviroments IT Def...Big Bang Theory: The Evolution of Pentesting High Security Enviroments IT Def...
Big Bang Theory: The Evolution of Pentesting High Security Enviroments IT Def...Chris Gates
 
DevOops Redux Ken Johnson Chris Gates - AppSec USA 2016
DevOops Redux Ken Johnson Chris Gates  - AppSec USA 2016DevOops Redux Ken Johnson Chris Gates  - AppSec USA 2016
DevOops Redux Ken Johnson Chris Gates - AppSec USA 2016Chris Gates
 
0day hunting a.k.a. The story of a proper CPE test
0day hunting a.k.a. The story of a proper CPE test0day hunting a.k.a. The story of a proper CPE test
0day hunting a.k.a. The story of a proper CPE testBalazs Bucsay
 
Outlook and Exchange for the bad guys
Outlook and Exchange for the bad guysOutlook and Exchange for the bad guys
Outlook and Exchange for the bad guysNick Landers
 
The Background Noise of the Internet
The Background Noise of the InternetThe Background Noise of the Internet
The Background Noise of the InternetAndrew Morris
 
BlueHat v17 || Out of the Truman Show: VM Escape in VMware Gracefully
BlueHat v17 || Out of the Truman Show: VM Escape in VMware Gracefully BlueHat v17 || Out of the Truman Show: VM Escape in VMware Gracefully
BlueHat v17 || Out of the Truman Show: VM Escape in VMware Gracefully BlueHat Security Conference
 
Буткит через СМС: оценка безопасности сети 4G
Буткит через СМС: оценка безопасности сети 4GБуткит через СМС: оценка безопасности сети 4G
Буткит через СМС: оценка безопасности сети 4GPositive Hack Days
 
Secure Yourself, Practice what we preach - BSides Austin 2015
Secure Yourself, Practice what we preach - BSides Austin 2015Secure Yourself, Practice what we preach - BSides Austin 2015
Secure Yourself, Practice what we preach - BSides Austin 2015Michael Gough
 
Wi-Fi Hotspot Attacks
Wi-Fi Hotspot AttacksWi-Fi Hotspot Attacks
Wi-Fi Hotspot AttacksGreg Foss
 
Windows logging workshop - BSides Austin 2014
Windows logging workshop - BSides Austin 2014Windows logging workshop - BSides Austin 2014
Windows logging workshop - BSides Austin 2014Michael Gough
 

What's hot (20)

[CB16] Facebook Malware: Tag Me If You Can by Ido Naor & Dani Goland
[CB16] Facebook Malware: Tag Me If You Can by Ido Naor & Dani Goland[CB16] Facebook Malware: Tag Me If You Can by Ido Naor & Dani Goland
[CB16] Facebook Malware: Tag Me If You Can by Ido Naor & Dani Goland
 
Lares from LOW to PWNED
Lares from LOW to PWNEDLares from LOW to PWNED
Lares from LOW to PWNED
 
BlueHat v17 || Wannacrypt + Smbv1.0 Vulnerability = One of the Most Damaging ...
BlueHat v17 || Wannacrypt + Smbv1.0 Vulnerability = One of the Most Damaging ...BlueHat v17 || Wannacrypt + Smbv1.0 Vulnerability = One of the Most Damaging ...
BlueHat v17 || Wannacrypt + Smbv1.0 Vulnerability = One of the Most Damaging ...
 
BlueHat v17 || Where, how, and why is SSL traffic on mobile getting intercept...
BlueHat v17 || Where, how, and why is SSL traffic on mobile getting intercept...BlueHat v17 || Where, how, and why is SSL traffic on mobile getting intercept...
BlueHat v17 || Where, how, and why is SSL traffic on mobile getting intercept...
 
Breaking Vaults - Stealing Lastpass Protected Secrets by Martin Vigo
Breaking Vaults - Stealing Lastpass Protected Secrets by Martin VigoBreaking Vaults - Stealing Lastpass Protected Secrets by Martin Vigo
Breaking Vaults - Stealing Lastpass Protected Secrets by Martin Vigo
 
Defcon 22-metacortex-grifter-darkside-of-the-internet
Defcon 22-metacortex-grifter-darkside-of-the-internetDefcon 22-metacortex-grifter-darkside-of-the-internet
Defcon 22-metacortex-grifter-darkside-of-the-internet
 
Internal Pentest: from z3r0 to h3r0
Internal Pentest: from z3r0 to h3r0Internal Pentest: from z3r0 to h3r0
Internal Pentest: from z3r0 to h3r0
 
DEF CON 27 - ORANGE TSAI and MEH CHANG - infiltrating corporate intranet like...
DEF CON 27 - ORANGE TSAI and MEH CHANG - infiltrating corporate intranet like...DEF CON 27 - ORANGE TSAI and MEH CHANG - infiltrating corporate intranet like...
DEF CON 27 - ORANGE TSAI and MEH CHANG - infiltrating corporate intranet like...
 
hackcon2013-Dirty Little Secrets They Didn't Teach You In Pentesting Class v2
hackcon2013-Dirty Little Secrets They Didn't Teach You In Pentesting Class v2hackcon2013-Dirty Little Secrets They Didn't Teach You In Pentesting Class v2
hackcon2013-Dirty Little Secrets They Didn't Teach You In Pentesting Class v2
 
Big Bang Theory: The Evolution of Pentesting High Security Enviroments IT Def...
Big Bang Theory: The Evolution of Pentesting High Security Enviroments IT Def...Big Bang Theory: The Evolution of Pentesting High Security Enviroments IT Def...
Big Bang Theory: The Evolution of Pentesting High Security Enviroments IT Def...
 
DevOops Redux Ken Johnson Chris Gates - AppSec USA 2016
DevOops Redux Ken Johnson Chris Gates  - AppSec USA 2016DevOops Redux Ken Johnson Chris Gates  - AppSec USA 2016
DevOops Redux Ken Johnson Chris Gates - AppSec USA 2016
 
0day hunting a.k.a. The story of a proper CPE test
0day hunting a.k.a. The story of a proper CPE test0day hunting a.k.a. The story of a proper CPE test
0day hunting a.k.a. The story of a proper CPE test
 
Outlook and Exchange for the bad guys
Outlook and Exchange for the bad guysOutlook and Exchange for the bad guys
Outlook and Exchange for the bad guys
 
Nessus and Reporting Karma
Nessus and Reporting KarmaNessus and Reporting Karma
Nessus and Reporting Karma
 
The Background Noise of the Internet
The Background Noise of the InternetThe Background Noise of the Internet
The Background Noise of the Internet
 
BlueHat v17 || Out of the Truman Show: VM Escape in VMware Gracefully
BlueHat v17 || Out of the Truman Show: VM Escape in VMware Gracefully BlueHat v17 || Out of the Truman Show: VM Escape in VMware Gracefully
BlueHat v17 || Out of the Truman Show: VM Escape in VMware Gracefully
 
Буткит через СМС: оценка безопасности сети 4G
Буткит через СМС: оценка безопасности сети 4GБуткит через СМС: оценка безопасности сети 4G
Буткит через СМС: оценка безопасности сети 4G
 
Secure Yourself, Practice what we preach - BSides Austin 2015
Secure Yourself, Practice what we preach - BSides Austin 2015Secure Yourself, Practice what we preach - BSides Austin 2015
Secure Yourself, Practice what we preach - BSides Austin 2015
 
Wi-Fi Hotspot Attacks
Wi-Fi Hotspot AttacksWi-Fi Hotspot Attacks
Wi-Fi Hotspot Attacks
 
Windows logging workshop - BSides Austin 2014
Windows logging workshop - BSides Austin 2014Windows logging workshop - BSides Austin 2014
Windows logging workshop - BSides Austin 2014
 

Viewers also liked

0box Analyzer--Afterdark Runtime Forensics for Automated Malware Analysis and...
0box Analyzer--Afterdark Runtime Forensics for Automated Malware Analysis and...0box Analyzer--Afterdark Runtime Forensics for Automated Malware Analysis and...
0box Analyzer--Afterdark Runtime Forensics for Automated Malware Analysis and...Wayne Huang
 
5.2. Digital forensics
5.2. Digital forensics5.2. Digital forensics
5.2. Digital forensicsdefconmoscow
 
Forensic Analysis and Discovery System
Forensic Analysis and Discovery SystemForensic Analysis and Discovery System
Forensic Analysis and Discovery SystemAzri Hafiz
 
Malware Analysis Made Simple
Malware Analysis Made SimpleMalware Analysis Made Simple
Malware Analysis Made SimplePaul Melson
 
Basic Malware Analysis
Basic Malware AnalysisBasic Malware Analysis
Basic Malware AnalysisAlbert Hui
 
Leveraging NTFS Timeline Forensics during the Analysis of Malware
Leveraging NTFS Timeline Forensics during the Analysis of MalwareLeveraging NTFS Timeline Forensics during the Analysis of Malware
Leveraging NTFS Timeline Forensics during the Analysis of Malwaretmugherini
 
openioc_scan - IOC scanner for memory forensics
openioc_scan - IOC scanner for memory forensicsopenioc_scan - IOC scanner for memory forensics
openioc_scan - IOC scanner for memory forensicsTakahiro Haruyama
 
SBC 2012 - Malware Memory Forensics (Nguyễn Chấn Việt)
SBC 2012 - Malware Memory Forensics (Nguyễn Chấn Việt)SBC 2012 - Malware Memory Forensics (Nguyễn Chấn Việt)
SBC 2012 - Malware Memory Forensics (Nguyễn Chấn Việt)Security Bootcamp
 
Advanced Malware Analysis Training Session 7 - Malware Memory Forensics
Advanced Malware Analysis Training Session 7  - Malware Memory ForensicsAdvanced Malware Analysis Training Session 7  - Malware Memory Forensics
Advanced Malware Analysis Training Session 7 - Malware Memory Forensicssecurityxploded
 
H@dfex 2015 malware analysis
H@dfex 2015   malware analysisH@dfex 2015   malware analysis
H@dfex 2015 malware analysisCharles Lim
 
Malware Analysis 101 - N00b to Ninja in 60 Minutes at BSidesLV on August 5, ...
Malware Analysis 101 -  N00b to Ninja in 60 Minutes at BSidesLV on August 5, ...Malware Analysis 101 -  N00b to Ninja in 60 Minutes at BSidesLV on August 5, ...
Malware Analysis 101 - N00b to Ninja in 60 Minutes at BSidesLV on August 5, ...grecsl
 
CNIT 126 7: Analyzing Malicious Windows Programs
CNIT 126 7: Analyzing Malicious Windows ProgramsCNIT 126 7: Analyzing Malicious Windows Programs
CNIT 126 7: Analyzing Malicious Windows ProgramsSam Bowne
 
computer forensics
computer forensicscomputer forensics
computer forensicsAkhil Kumar
 
Introduction to Malware Analysis
Introduction to Malware AnalysisIntroduction to Malware Analysis
Introduction to Malware AnalysisAndrew McNicol
 

Viewers also liked (16)

0box Analyzer--Afterdark Runtime Forensics for Automated Malware Analysis and...
0box Analyzer--Afterdark Runtime Forensics for Automated Malware Analysis and...0box Analyzer--Afterdark Runtime Forensics for Automated Malware Analysis and...
0box Analyzer--Afterdark Runtime Forensics for Automated Malware Analysis and...
 
Basic malware analysis
Basic malware analysisBasic malware analysis
Basic malware analysis
 
5.2. Digital forensics
5.2. Digital forensics5.2. Digital forensics
5.2. Digital forensics
 
Forensic Analysis and Discovery System
Forensic Analysis and Discovery SystemForensic Analysis and Discovery System
Forensic Analysis and Discovery System
 
Malware Analysis Made Simple
Malware Analysis Made SimpleMalware Analysis Made Simple
Malware Analysis Made Simple
 
Basic Malware Analysis
Basic Malware AnalysisBasic Malware Analysis
Basic Malware Analysis
 
Leveraging NTFS Timeline Forensics during the Analysis of Malware
Leveraging NTFS Timeline Forensics during the Analysis of MalwareLeveraging NTFS Timeline Forensics during the Analysis of Malware
Leveraging NTFS Timeline Forensics during the Analysis of Malware
 
openioc_scan - IOC scanner for memory forensics
openioc_scan - IOC scanner for memory forensicsopenioc_scan - IOC scanner for memory forensics
openioc_scan - IOC scanner for memory forensics
 
SBC 2012 - Malware Memory Forensics (Nguyễn Chấn Việt)
SBC 2012 - Malware Memory Forensics (Nguyễn Chấn Việt)SBC 2012 - Malware Memory Forensics (Nguyễn Chấn Việt)
SBC 2012 - Malware Memory Forensics (Nguyễn Chấn Việt)
 
Investigating Malware using Memory Forensics
Investigating Malware using Memory ForensicsInvestigating Malware using Memory Forensics
Investigating Malware using Memory Forensics
 
Advanced Malware Analysis Training Session 7 - Malware Memory Forensics
Advanced Malware Analysis Training Session 7  - Malware Memory ForensicsAdvanced Malware Analysis Training Session 7  - Malware Memory Forensics
Advanced Malware Analysis Training Session 7 - Malware Memory Forensics
 
H@dfex 2015 malware analysis
H@dfex 2015   malware analysisH@dfex 2015   malware analysis
H@dfex 2015 malware analysis
 
Malware Analysis 101 - N00b to Ninja in 60 Minutes at BSidesLV on August 5, ...
Malware Analysis 101 -  N00b to Ninja in 60 Minutes at BSidesLV on August 5, ...Malware Analysis 101 -  N00b to Ninja in 60 Minutes at BSidesLV on August 5, ...
Malware Analysis 101 - N00b to Ninja in 60 Minutes at BSidesLV on August 5, ...
 
CNIT 126 7: Analyzing Malicious Windows Programs
CNIT 126 7: Analyzing Malicious Windows ProgramsCNIT 126 7: Analyzing Malicious Windows Programs
CNIT 126 7: Analyzing Malicious Windows Programs
 
computer forensics
computer forensicscomputer forensics
computer forensics
 
Introduction to Malware Analysis
Introduction to Malware AnalysisIntroduction to Malware Analysis
Introduction to Malware Analysis
 

Similar to Malware Analysis For The Enterprise

Fundamentals of network hacking
Fundamentals of network hackingFundamentals of network hacking
Fundamentals of network hackingPranshu Pareek
 
Abusing bleeding edge web standards for appsec glory
Abusing bleeding edge web standards for appsec gloryAbusing bleeding edge web standards for appsec glory
Abusing bleeding edge web standards for appsec gloryPriyanka Aash
 
How to secure your web applications with NGINX
How to secure your web applications with NGINXHow to secure your web applications with NGINX
How to secure your web applications with NGINXWallarm
 
Sandbox detection: leak, abuse, test - Hacktivity 2015
Sandbox detection: leak, abuse, test - Hacktivity 2015Sandbox detection: leak, abuse, test - Hacktivity 2015
Sandbox detection: leak, abuse, test - Hacktivity 2015Zoltan Balazs
 
Why we didn't catch that application bugs
Why we didn't catch that   application bugsWhy we didn't catch that   application bugs
Why we didn't catch that application bugsgaoliang641
 
StHack 2014 - Jerome "@funoverip" Nokin Turning your managed av into my botnet
StHack 2014 - Jerome "@funoverip" Nokin  Turning your managed av into my botnetStHack 2014 - Jerome "@funoverip" Nokin  Turning your managed av into my botnet
StHack 2014 - Jerome "@funoverip" Nokin Turning your managed av into my botnetStHack
 
Threat Con 2021: What's Hitting my Honeypots
Threat Con 2021: What's Hitting my HoneypotsThreat Con 2021: What's Hitting my Honeypots
Threat Con 2021: What's Hitting my HoneypotsAPNIC
 
Malware Analysis 101: N00b to Ninja in 60 Minutes at BSidesDC on October 19, ...
Malware Analysis 101: N00b to Ninja in 60 Minutes at BSidesDC on October 19, ...Malware Analysis 101: N00b to Ninja in 60 Minutes at BSidesDC on October 19, ...
Malware Analysis 101: N00b to Ninja in 60 Minutes at BSidesDC on October 19, ...grecsl
 
Cloud Device Insecurity
Cloud Device InsecurityCloud Device Insecurity
Cloud Device InsecurityJeremy Brown
 
The Hacking Games - A Road to Post Exploitation Meetup - 20240222.pptx
The Hacking Games - A Road to Post Exploitation Meetup - 20240222.pptxThe Hacking Games - A Road to Post Exploitation Meetup - 20240222.pptx
The Hacking Games - A Road to Post Exploitation Meetup - 20240222.pptxlior mazor
 
Securing your Cloud Environment v2
Securing your Cloud Environment v2Securing your Cloud Environment v2
Securing your Cloud Environment v2ShapeBlue
 
System hardening - OS and Application
System hardening - OS and ApplicationSystem hardening - OS and Application
System hardening - OS and Applicationedavid2685
 
Tracking Exploit Kits - Virus Bulletin 2016
Tracking Exploit Kits - Virus Bulletin 2016Tracking Exploit Kits - Virus Bulletin 2016
Tracking Exploit Kits - Virus Bulletin 2016John Bambenek
 
The Internet of Insecure Things: 10 Most Wanted List
The Internet of Insecure Things: 10 Most Wanted ListThe Internet of Insecure Things: 10 Most Wanted List
The Internet of Insecure Things: 10 Most Wanted ListSecurity Weekly
 
A New Framework for Detection
A New Framework for DetectionA New Framework for Detection
A New Framework for DetectionSourcefire VRT
 
[CB20] Vulnerabilities of Machine Learning Infrastructure by Sergey Gordeychik
[CB20] Vulnerabilities of Machine Learning Infrastructure by Sergey Gordeychik[CB20] Vulnerabilities of Machine Learning Infrastructure by Sergey Gordeychik
[CB20] Vulnerabilities of Machine Learning Infrastructure by Sergey GordeychikCODE BLUE
 
Step On In, The Water's Fine! - An Introduction To Security Testing Within A ...
Step On In, The Water's Fine! - An Introduction To Security Testing Within A ...Step On In, The Water's Fine! - An Introduction To Security Testing Within A ...
Step On In, The Water's Fine! - An Introduction To Security Testing Within A ...Tom Moore
 
Secure Software: Action, Comedy or Drama? (2017 edition)
Secure Software: Action, Comedy or Drama? (2017 edition)Secure Software: Action, Comedy or Drama? (2017 edition)
Secure Software: Action, Comedy or Drama? (2017 edition)Peter Sabev
 
Shameful Secrets of Proprietary Network Protocols - OWASP AppSec EU 2014
Shameful Secrets of Proprietary Network Protocols - OWASP AppSec EU 2014Shameful Secrets of Proprietary Network Protocols - OWASP AppSec EU 2014
Shameful Secrets of Proprietary Network Protocols - OWASP AppSec EU 2014Jakub Kałużny
 

Similar to Malware Analysis For The Enterprise (20)

Fundamentals of network hacking
Fundamentals of network hackingFundamentals of network hacking
Fundamentals of network hacking
 
Abusing bleeding edge web standards for appsec glory
Abusing bleeding edge web standards for appsec gloryAbusing bleeding edge web standards for appsec glory
Abusing bleeding edge web standards for appsec glory
 
How to secure your web applications with NGINX
How to secure your web applications with NGINXHow to secure your web applications with NGINX
How to secure your web applications with NGINX
 
Sandbox detection: leak, abuse, test - Hacktivity 2015
Sandbox detection: leak, abuse, test - Hacktivity 2015Sandbox detection: leak, abuse, test - Hacktivity 2015
Sandbox detection: leak, abuse, test - Hacktivity 2015
 
Why we didn't catch that application bugs
Why we didn't catch that   application bugsWhy we didn't catch that   application bugs
Why we didn't catch that application bugs
 
StHack 2014 - Jerome "@funoverip" Nokin Turning your managed av into my botnet
StHack 2014 - Jerome "@funoverip" Nokin  Turning your managed av into my botnetStHack 2014 - Jerome "@funoverip" Nokin  Turning your managed av into my botnet
StHack 2014 - Jerome "@funoverip" Nokin Turning your managed av into my botnet
 
Threat Con 2021: What's Hitting my Honeypots
Threat Con 2021: What's Hitting my HoneypotsThreat Con 2021: What's Hitting my Honeypots
Threat Con 2021: What's Hitting my Honeypots
 
Malware Analysis 101: N00b to Ninja in 60 Minutes at BSidesDC on October 19, ...
Malware Analysis 101: N00b to Ninja in 60 Minutes at BSidesDC on October 19, ...Malware Analysis 101: N00b to Ninja in 60 Minutes at BSidesDC on October 19, ...
Malware Analysis 101: N00b to Ninja in 60 Minutes at BSidesDC on October 19, ...
 
Cloud Device Insecurity
Cloud Device InsecurityCloud Device Insecurity
Cloud Device Insecurity
 
The Hacking Games - A Road to Post Exploitation Meetup - 20240222.pptx
The Hacking Games - A Road to Post Exploitation Meetup - 20240222.pptxThe Hacking Games - A Road to Post Exploitation Meetup - 20240222.pptx
The Hacking Games - A Road to Post Exploitation Meetup - 20240222.pptx
 
Securing your Cloud Environment v2
Securing your Cloud Environment v2Securing your Cloud Environment v2
Securing your Cloud Environment v2
 
DDoS: practical survival
DDoS: practical survivalDDoS: practical survival
DDoS: practical survival
 
System hardening - OS and Application
System hardening - OS and ApplicationSystem hardening - OS and Application
System hardening - OS and Application
 
Tracking Exploit Kits - Virus Bulletin 2016
Tracking Exploit Kits - Virus Bulletin 2016Tracking Exploit Kits - Virus Bulletin 2016
Tracking Exploit Kits - Virus Bulletin 2016
 
The Internet of Insecure Things: 10 Most Wanted List
The Internet of Insecure Things: 10 Most Wanted ListThe Internet of Insecure Things: 10 Most Wanted List
The Internet of Insecure Things: 10 Most Wanted List
 
A New Framework for Detection
A New Framework for DetectionA New Framework for Detection
A New Framework for Detection
 
[CB20] Vulnerabilities of Machine Learning Infrastructure by Sergey Gordeychik
[CB20] Vulnerabilities of Machine Learning Infrastructure by Sergey Gordeychik[CB20] Vulnerabilities of Machine Learning Infrastructure by Sergey Gordeychik
[CB20] Vulnerabilities of Machine Learning Infrastructure by Sergey Gordeychik
 
Step On In, The Water's Fine! - An Introduction To Security Testing Within A ...
Step On In, The Water's Fine! - An Introduction To Security Testing Within A ...Step On In, The Water's Fine! - An Introduction To Security Testing Within A ...
Step On In, The Water's Fine! - An Introduction To Security Testing Within A ...
 
Secure Software: Action, Comedy or Drama? (2017 edition)
Secure Software: Action, Comedy or Drama? (2017 edition)Secure Software: Action, Comedy or Drama? (2017 edition)
Secure Software: Action, Comedy or Drama? (2017 edition)
 
Shameful Secrets of Proprietary Network Protocols - OWASP AppSec EU 2014
Shameful Secrets of Proprietary Network Protocols - OWASP AppSec EU 2014Shameful Secrets of Proprietary Network Protocols - OWASP AppSec EU 2014
Shameful Secrets of Proprietary Network Protocols - OWASP AppSec EU 2014
 

More from Jason Ross

Nodejs Security
Nodejs SecurityNodejs Security
Nodejs SecurityJason Ross
 
Tizen Security
Tizen SecurityTizen Security
Tizen SecurityJason Ross
 
AC2DM For Security
AC2DM For SecurityAC2DM For Security
AC2DM For SecurityJason Ross
 
Android malware analysis
Android malware analysisAndroid malware analysis
Android malware analysisJason Ross
 
Alice and Bob are Eff'd
Alice and Bob are Eff'dAlice and Bob are Eff'd
Alice and Bob are Eff'dJason Ross
 
WHOIS the Master
WHOIS the MasterWHOIS the Master
WHOIS the MasterJason Ross
 
Dev opsec killing-the_buzz
Dev opsec killing-the_buzzDev opsec killing-the_buzz
Dev opsec killing-the_buzzJason Ross
 

More from Jason Ross (7)

Nodejs Security
Nodejs SecurityNodejs Security
Nodejs Security
 
Tizen Security
Tizen SecurityTizen Security
Tizen Security
 
AC2DM For Security
AC2DM For SecurityAC2DM For Security
AC2DM For Security
 
Android malware analysis
Android malware analysisAndroid malware analysis
Android malware analysis
 
Alice and Bob are Eff'd
Alice and Bob are Eff'dAlice and Bob are Eff'd
Alice and Bob are Eff'd
 
WHOIS the Master
WHOIS the MasterWHOIS the Master
WHOIS the Master
 
Dev opsec killing-the_buzz
Dev opsec killing-the_buzzDev opsec killing-the_buzz
Dev opsec killing-the_buzz
 

Recently uploaded

Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clashcharlottematthew16
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostZilliz
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024The Digital Insurer
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piececharlottematthew16
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Vector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesVector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesZilliz
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 

Recently uploaded (20)

Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piece
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Vector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesVector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector Databases
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 

Malware Analysis For The Enterprise

  • 1. malware analysis for the enterprise jason ross
  • 3. obligatory narcissism • worked in IT security for > 10 years • employed with the BT ethical hacking team • contribute to various malware research groups & internet security communities • PoC for the 585 defcon group
  • 4. what are we talking about? we are awesome at compliance! • do you know when a host is compromised? • can you tell if other hosts were? • what data was taken? • do you have any idea where it went? so why are we getting owned? because the current security mindset sucks.
  • 5. compliance != security • we’re not getting better at securing systems • we are becoming adept at evading the average security auditor.
  • 6. "has data loss jumped the shark?" Despite the statements in the prior slide, we are seeing a decrease in data loss incidents
  • 7. owned != dataloss • Websense states in their 2009 Q1 "State of the Internet” report : – 671% growth in malicious web sites in the past year. – 77% of these were legitimate sites that had been compromised.
  • 8. what does that mean? they may be looking to use your brand image. the intended victim may not even be your customer. attackers may not be interested in your data at all.
  • 9. arms race ++ industry: let’s use signatures! malware: i can has packing, crypto, and some polymorphism? protection fail.
  • 10. heuristics won't save you • they can be useful and effective • they miss things • especially if multiple stages are involved
  • 11. some ways malware defeats AV • encrypt the code with strong ciphers and randomized keys • alter the codebase in an automated fashion (polymorphism) • pack the executable
  • 12. the state of anti-malware is abysmal • examples of suckage: • different signatures for the same malware. • vendors can't even agree on a name! reactive technology is, by definition, not going to be securing proactively.
  • 14. at least AV is catching stuff. that's good, right? the host was probably compromised before AV caught whatever it alerted on. that’s because malware does not infect a host using a single stage process. prepare for HolyCrap!
  • 15. how malware works (really!) image taken from the FireEye Research Blog: http://blog.fireeye.com/research/2009/04/botnetweb.html
  • 16. it's a business, not a kiddie • payroll • support models • distribution channels • strategic partnerships
  • 17. downloads & droppers & rootkits, oh my! • stage one: drive-by download • stage two: load more malware • stage three: profit!
  • 18. pfft. only mom & pop sites are being used for droppers, right?
  • 19. um. wow. that sucks. • yes. yes it does. • still think you’re safe because IDS, AV, or even a QSA says so? • that’s OK, so did these guys: current (2009) US population : 307 million records lost by these companies : 264 million percentage of population “owned” : ~86 %
  • 20. more lessons from heartland • malcode authors are invested in long term solutions • malware is increasingly targeted
  • 21. scary example time • URLZone – My balance is fine! • Monkif / DIKhora – Nothing here but us JPEGs
  • 22. where does malware analysis fit in? • virus protection is familiar to us • as a result, we treat infection casually • a virus alert is a security incident • does your incident response policy address virus alerts?
  • 23. a clever transitional slide • malware is bad • analyzing it is necessary • how do we do that? – static analysis – run-time analysis
  • 25. what is a sandnet? • a test environment using multiple hosts • isolated from the production network • used to analyze malicious software
  • 26. what are the options? • online labs • virtual machines • bare metal
  • 27. online labs • convenient • little skill required • may not be comprehensive • may be problematic from a security POV
  • 28. roll your own • more comprehensive • potentially less problematic • more expensive • harder
  • 29. vm, or bare metal? • vm is cheaper & more efficient • bare metal may be more accurate
  • 30. jumping the sharK! (demo of sharK 3.1)
  • 31. how many hosts? • At least 2 probably – Victim – Services / Monitoring > VBoxManage list vms "linux" {ad59f194-585e-49c5-a54c-5e92322b1188} "winxp_sp3_01" {7a554f4e-6aea-42f1-a3c5-488d43f161ff}
  • 32. network configuration • isolated from production networks – including the Internet • but the multi-stage download process requires access to malicious servers haven't found a "good" solution for that yet (IPS on outbound traffic?)
  • 33. use the internal network feature > VBoxManage showvminfo winxp_sp3_01 Name: winxp_sp3_01 Guest OS: Windows XP UUID: 7a554f4e-6aea-42f1-a3c5-488d43f161ff Memory size: 512MB VRAM size: 12MB Number of CPUs: 1 NIC 1: MAC: 080027D32767, Attachment: Internal Network 'intnet'
  • 34. dhcp - because dynamic is easy > VBoxManage dhcpserver add --netname intnet --ip 192.168.3.1 --netmask 255.255.255.0 --lowerip 192.168.3.100 --upperip 192.168.3.250 --enable
  • 35. monitoring traffic • let the VM do the work for you > VBoxManage modifyvm xp_victim --nictrace1 on --nictracefile1 “C:UsersTestlinux.pcap”
  • 36. dns - all your zones… • configured to be SOA for * • returns the IP of the monitoring host for all resource requests
  • 37. Remember the MX db.wildcard $TTL 604800 @ IN SOA localhost. root.localhost. ( 2010012201 ; serial 604800 ; refresh 86400 ; retry 2419200 ; expire 604800) ; negative cache ttl @ IN NS localhost. * IN MX 10 mail. * IN A 192.168.3.101
  • 38. apache configuration • mod_forensic is your friend • configuration is easy: ForensicLog /var/log/apache2/forensic_log • Enable and reload: # a2enmod log_forensic # apache2ctl reload
  • 39. sample forensic log +2021:4adf8568:0 |GET / HTTP/1.1 |Accept:*/* |Accept-Language:en-us |Accept-Encoding:gzip, deflate |User-Agent:Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1) |Host:192.168.3.101 |Connection:Keep-Alive |Cache-Control:no-cache -2021:4adf8568:0
  • 40. directly you’ll be directed in the right direction • configure apache to redirect all incoming requests to a known page: Redirect /* /index.html ErrorDocument 404 /index.html
  • 41. fun with netcat • very easy to set up: # netcat –nvlp 8080 –o tcp_8080.txt < 00000000 47 45 54 20 2f 20 48 54 54 50 2f 31 2e 31 0d 0a # GET / HTTP/1.1.. < 00000010 41 63 63 65 70 74 3a 20 69 6d 61 67 65 2f 67 69 # Accept: image/gi < 00000020 66 2c 20 69 6d 61 67 65 2f 78 2d 78 62 69 74 6d # f, image/x-xbitm < 00000030 61 70 2c 20 69 6d 61 67 65 2f 6a 70 65 67 2c 20 # ap, image/jpeg, < 00000040 69 6d 61 67 65 2f 70 6a 70 65 67 2c 20 61 70 70 # image/pjpeg, app < 00000050 6c 69 63 61 74 69 6f 6e 2f 78 2d 73 68 6f 63 6b # lication/x-shock < 00000060 77 61 76 65 2d 66 6c 61 73 68 2c 20 2a 2f 2a 0d # wave-flash, */*. < 00000070 0a 41 63 63 65 70 74 2d 4c 61 6e 67 75 61 67 65 # .Accept-Language < 00000080 3a 20 65 6e 2d 75 73 0d 0a 41 63 63 65 70 74 2d # : en-us..Accept- < 00000090 45 6e 63 6f 64 69 6e 67 3a 20 67 7a 69 70 2c 20 # Encoding: gzip, < 000000a0 64 65 66 6c 61 74 65 0d 0a 55 73 65 72 2d 41 67 # deflate..User-Ag < 000000b0 65 6e 74 3a 20 4d 6f 7a 69 6c 6c 61 2f 34 2e 30 # ent: Mozilla/4.0 < 000000c0 20 28 63 6f 6d 70 61 74 69 62 6c 65 3b 20 4d 53 # (compatible; MS < 000000d0 49 45 20 36 2e 30 3b 20 57 69 6e 64 6f 77 73 20 # IE 6.0; Windows < 000000e0 4e 54 20 35 2e 31 3b 20 53 56 31 29 0d 0a 48 6f # NT 5.1; SV1)..Ho < 000000f0 73 74 3a 20 31 39 32 2e 31 36 38 2e 33 2e 31 30 # st: 192.168.3.10 < 00000100 31 3a 38 30 38 30 0d 0a 43 6f 6e 6e 65 63 74 69 # 1:8080..Connecti < 00000110 6f 6e 3a 20 4b 65 65 70 2d 41 6c 69 76 65 0d 0a # on: Keep-Alive.. < 00000120 0d 0a # ..
  • 42. javascript de-obfuscation • SpiderMonkey rules • biggest issue is no ‘document’ object • Didier Stevens’ port is even better – adds features specific to malware analysis – including document.write()
  • 43. victim host • iDefense malcode analyst pack • Regshot • strings • wireshark
  • 44. Demo!
  • 45. online resources Anubis: http://anubis.iseclab.org/ Virus Total http://www.virustotal.com/ CERT.at Do-It-Yourself Kit http://cert.at/downloads/papers/mass_malw are_analysis_en.html
  • 46. the end algorythm@gmail.com if you want to contact me for some crazy reason, here's how you can: https://twitter.com/rossja

Editor's Notes

  1. Malware Analysis for the Enterprise © 2009 – 2010 Jason Ross <algorythm@gmail.com>
  2. In a typical organization, an attack from malicious software (known as malware) is not likely to go completely unnoticed. Detection of an attack usually comes through one or more technologies: antivirus software intrusion detection systems systems compliance monitoring Unfortunately, detection of the attack is not sufficient to identify the full risk posed by malware. Often, detection occurs after the host has already been compromised. As malware evolves and grows increasingly complex, it is utilizing self-defense mechanisms such as root kit technologies to try to keep the infected host compromised. This makes it more and more likely that a malware attack will be able to evade detection for a small period of time. If our defenses aren't keeping up with the changing face of the battle, they face "great wall" syndrome… the great wall of china was once arguably the greatest defense against invading forces in the world. it is now a tourist attraction. Our defensive mechanisms are facing a similar degradation of purpose. As a result, once a host’s integrity has become compromised a crucial part of the incident response process is to determine what activity the malicious code is (or was) engaged in. Specifically, it's important to find out whether any data has been compromised, and where it went to.
  3. more about me can be found at http://www.linkedin.com/in/algorythm if anyone's really that interested.
  4. PCI says “you have to have a gate”, so fine, we put in a gate, get our checkbox, and move on with little real improvement to our security. while we’re playing the shell game with our systems, the miscreants are actively innovating and improving their techniques. *nod to chris nickerson for the text of this slide*
  5. Lyger from datalossdb.org has asked the question: "Has data loss jumped the shark? … About six weeks ago, I reposted a question sent to the Data Loss mail list from an earlier post made over two years prior asking the same question. To date, the replies we have received can be counted on one hand, but the evidence shown at the top of the main DataLossDB page is somewhat clear: for the last several months, we (meaning OSF) have received less reports and have seen less news about breaches involving personally identifying information. " http://datalossdb.org/incident_highlights/38-has-data-loss-jumped-the-shark
  6. other than just compromising vulnerable web servers, web based advertising is being used by miscreants because it allows them to get malicious code onto legitimate sites with little effort. while technologies like websense block 'known malicious' websites, it's unlikely that they are blocking walmart , or microsoft. Websense Security Labs Report - State of Internet Security Q1 - Q2 2009 http://community.websense.com/blogs/websense-features/archive/2009/09/15/websense-security-labs-report-state-of-internet-security-q1-q2-2009.aspx
  7. generally, an organization is only concerned about securing the data they have to secure in order to fill whatever compliance checkbox applies to them. even in cases where the organization is interested in securing data for reasons other than compliance, it is self-motivated. the problem with that is, the attackers we are trying to defend against may not really be after our data at all. attackers may just be looking for a trusted brand they can leverage to get people to download their code, either by embedding iframes on a website owned by you, or by using your reputation to boost search engine ratings for another site they've compromised. many organizations are not approaching security from the POV that the intended victim isn't necessarily the org itself, but their customers, or perhaps someone else entirely. as a culture, we aren't prepared to think about security in terms of "protecting the other guy". as an industry, we are just beginning to reach the point where top level management is becoming aware of the need for performing assessment and testing against networks and hosts. we are nowhere near the point where organizations are prepared to proactively “attack” users, even though that’s where the threat has moved to.
  8. One of the main ways that anti malware products work is by creating a binary signature of a piece of malicious software, or network traffic characteristics. If a file on the system or a packet on the wire matches the signature, it is determined to be the given malicious software, and is dealt with according to the policies that have been set up either by the vendor, or the organization deploying the product. This works reasonably well when the quantity of unique malicious software is relatively small; however, this method does not scale well. As the number of unique samples grows, managing the signatures required to identify them becomes problematic. Further, if the number of unique samples increases at a significant rate, for example, if the author has created a number of variants ahead of time and releases them serially, the amount of time a given piece of malcode is able to remain undetected increases as well, as the resources required to develop new signatures often do not increase to keep up with the influx. (Gunter Ollman from Damballa discusses this in his paper "The Botnet vs. Malware Relationship: The One-to-One Botnet Myth" http://www.damballa.com/downloads/d_pubs/WP%20Many-to-Many%20Botnet%20Relationships%20(2009-05-21).pdf ) This leads to what is essentially a signature arms race, where the authors of malware take advantage of the time between their software being deployed, and the time it takes the anti-virus industry to analyze it and develop a signature pattern.
  9. In an effort to come out on top of this race, the industry has developed heuristic detection, which is used to categorize and group classes of malicious activity. While this does help, it is not sufficient to catch all malicious activity. Further, to prevent heuristics from working effectively, malware is deploying in multiple stages. Since heuristics are checking for specific types of activity being performed by an executable, the compromise has been broken down into several steps, often by multiple executables, making it possible for a system to be at least partially compromised without the anti-virus product detecting it. Apart from heuristics, many anti-virus products have taken to identifying any software which is packed as being malicious. Since legitimate software packages also use packers to decrease the size of their programs, this fosters complacency in the end user as the number of false positives increases.
  10. Further complicating this situation is the fact that malware now comes with a support model. Often included in this support is a guarantee that a given piece of malware will remain undetectable. Should an anti-virus product create a signature to detect the malware successfully, the author will alter the binary such that it no longer matches the signature – for the life of the support plan. This is accomplished in a number of ways: creating routines which encrypt the code using strong cryptographic ciphers, and randomized keys completely altering the codebase itself in an automated fashion by using polymorphic routines packing and compressing the executables Each of the above methods alters the resulting binary in ways that make it difficult to analyze, let alone create a single signature pattern for it. As a result researchers are flooded with samples which may all be the same piece of malcode, but because each one has different properties, they require different signatures. Online resources such as Virus Total assist malware authors in this process by allowing them to easily determine the detection rate of their malicious binary. In 2007, Panda software released a study which stated that 78% of of new malware at that time used some form of file packer (Panda Software: Packing malware, growing threat 6/5/2007 ) That was 2 years ago. things have gotten worse.
  11. we are essentially giving aspirin and protective headgear to people after they've already been punched in the face. such things are nice for the future, but not terribly helpful to a person spitting their teeth onto the mat (well, maybe the aspirin is. a little.)
  12. if your AV is going off all the time, that could be a clue that something in your company is not working the way it should. like the employees for instance. there are likely organizational policies which are being ignored or violated, especially if you have an internet usage policy. the fact is however, it could be the case that none of this is true; your employees may be visiting sites that are completely innocuous, or even required for their job, which have been compromised and are now serving drive-by-downloads. the real issue is, if your AV is alerting all the time, that means you are under active attack, just not the way you expected to be.
  13. the article this image was taken from explains the relationship between malware families and various botnets. a similar article was recently published by Damballa: The Botnet vs. Malware Relationship: The One-to-One Botnet Myth http://www.damballa.com/elqNow/elqRedir.htm?ref=http://www.damballa.com/downloads/d_pubs/WP%20Many-to-Many%20Botnet%20Relationships%20(2009-05-21).pdf key points in each report is that malware is complex, malcode authors and botherders are collaborating with each other, and they are utilizing multiple variants of the same bot to make AV detection less effective. as a result, thinking of this in terms of single virus infections is not accurate, and does not reflect the complexity of the true threat.
  14. Where malware was once being designed for fun, research, fame, or even to promote socio-economic activist ideals, today creating and managing malicious software has become a solid business model for criminals, and it is part of a robust underground economy. Because it’s a business product, malware today has completely different goals than in the past. To meet these new goals, the complexity of the code, as well as the infection process, has increased substantially. Additionally, we are seeing the delivery pattern of malware change to meet the needs of the clients being served by the malware industry. For example, rather than infecting as many computers as possible, a piece of malware may be limited to perhaps a few selected computers within a specific organization. At the same time, another piece of malware may be served via a legitimate web site which has been compromised, to as many people as visit the site. These differences in methods exist to meet the needs of clients with different goals.
  15. initial code is injected into websites (usually using iframes). the sites may be owned by the attackers though more often they are compromised legitimate sites. the executables used in this stage are generally not detectable by anti virus software. this initial software is referred to as a ”dropper”. once these have been loaded onto the victim, they simply begin the second wave of attack, often using HTTP to retrieve additional malicious software. The second wave handles things like disabling anti virus software, manipulating host based firewall rule sets, installing root kits to hide malicious activity from the OS, and in some cases inserting code into the boot sector of the hard drive to allow them to remain in place even if the OS is cleaned. It's becoming increasingly common for malware to use more than one type of virus at this step, in an effort to ensure successful compromise. If AV triggers, it is usually at this point. The host has already been compromised however, because we are at step 2 in this process. AV may have caught one of the new malware installation attempts, but were there others? Did it catch all of them? How do you know? Often security professionals will respond to an anti-virus alert that indicates a host was compromised by doing the following: Login to the host to investigate Viewing the processes running on the system Check open network connections   If “nothing unusual” is found, often the decision is made that the host is clean, and the anti-virus software did its job. The problem with this is that once a rootkit is installed, nothing the kernel tells you can be trusted. The author of the malware can use the rootkit technology to hide processes, registry entries, network connections, directories, etc. For this reason it is becoming the recommended practice that if a host becomes infected, it should be wiped and reinstalled from scratch. However, even this may not be enough, as the use of boot sector rootkits is growing. To ensure the system is no longer infected, it is necessary to format the boot sector of the hard drive as well.
  16. November 04, 2009 - apple.com had a windows logo inserted into the page via a cross-site scripting vulnerability. within the hour, microsoft.com had an apple logo on their site, also via a cross-site scripting vulnerability. while these examples were innocuous, they could have been used to inject malicious code rather than as a prank.
  17. ------------------------------------------------------------------------------------------------------------------------ Records | Date | Organizations ------------------------------------------------------------------------------------------------------------------------ 130,000,000 | 2009-01-20 | Heartland Payment Systems 94,000,000 | 2007-01-17 | TJX Companies Inc. 40,000,000 | 2005-06-19 | CardSystems (Visa, MasterCard, American Express) ------------------------------------------------------------------------------------------------------------------------ Source: datalossdb.org QSA == a PCI Qualified Security Assessor. https://www.pcisecuritystandards.org/pdfs/qsa_validation_requirements.pdf
  18. From the Heartland Data Breach FAQ: How did we learn about the breach? After being alerted by Visa and MasterCard of suspicious activity surrounding processed card transactions, Heartland enlisted the help of several forensic auditors to conduct a thorough investigation into the matter. Malicious software was discovered that potentially enabled data to be compromised as it crossed Heartland's network http://www.2008breach.com/HeartlandFAQ.asp From the DoJ case summary: The indictment ... alleges that beginning in October 2006, Gonzalez and his co-conspirators researched the credit and debit card systems used by their victims; devised a sophisticated attack to penetrate their networks and steal credit and debit card data; and then sent that data to computer servers they operated in California, Illinois, Latvia, the Netherlands and Ukraine. The indictment also alleges Gonzalez and his co-conspirators also used sophisticated hacker techniques to cover their tracks and to avoid detection by anti-virus software used by their victims. http://www.usdoj.gov/opa/pr/2009/August/09-crm-810.html
  19. URLZone New malware being used by cybercrooks does more than let hackers loot a bank account; it hides evidence of a victim’s dwindling balance by rewriting online bank statements on the fly, according to a new report. The sophisticated hack uses a Trojan horse program installed on the victim’s machine that alters html coding before it’s displayed in the user’s browser, to either erase evidence of a money transfer transaction entirely from a bank statement, or alter the amount of money transfers and balances. http://www.wired.com/threatlevel/2009/09/rogue-bank-statements/ Monkif / DIKhora: The Monkif / DIKhora botnet, which is pushing out Trojan downloaders to infected machines, is encoding the instructions to appear as if the command-and-control server is returning a JPEG image file, according to SecureWorks researcher Jason Milletary. … The server sets the HTTP Content-Type header to “image/jpeg” and prefaces the bot commands with a fake 32-byte JPEG header. The bot checks if the header matches and decodes the rest of the response to retrieve its commands. The commands are encoded using a single byte XOR with 0×4. http://blogs.zdnet.com/security/?p=4507 we are still reacting to viruses as though we were still in 2001. clearly, times have changed, motivations have changed, and techniques have changed … so why hasn't our defense changed?
  20. If analyzing malware is to be an essential component of an organization’s security posture, it’s important to understand how it relates to the process and policies already in place at that organization. Because malware has been part of the computer security threat landscape for so long, and due to the media attention given to high profile attacks, viruses have become common. As a result, malware is often not seen for the serious risk it poses. The quirky names often given to viruses, (such as Slammer, Melissa, or of course I Love You), exacerbate this tendency to trivialize an infected host as a nuisance rather than a true security threat. Thus, despite the fact that the infection process and purpose of malware have significantly changed, the response to infection and compromise has essentially remained the same: identify, create a signature, and clean. As a result, infection handling is generally left out of the incident response policies. This is a mistake. Malware is typically deployed in a multi-stage process, the end result of which is frequently complete control of the victim host by an attacker. This means that each alert from an anti-virus product could in fact be notifying you of the fact that you’ve now got a hostile host on your network. Worse, the attacker using the host is using whatever credentials are available, which means your firewall is useless, and the theoretical “malicious insider” problem has just become real, only the insider isn’t Bob from Accounting, it’s a hostile foreign entity that now owns Bob’s computer and is sending data from it to some other compromised host they control over an encrypted tunnel. Accordingly, how an organization deals with infected hosts has a number of implications. For example, if the infected host (or the end user the host belongs to) accesses sensitive information, there could be a number of legal and compliance problems that arise, including notification to customers that their data may have been compromised.   (Section 13402 of the HITECH Act requires HIPAA covered entities to “notify affected individuals… following the discovery of a breach of unsecured protected health information”. See the HITECH Act Breach Notification Guidance. If an infected host under the control of a botherder accesses such information, it should rightly be considered a breach.)
  21. ok. maybe it's not all *that* clever. ;-) There are two techniques which can be used to perform an analysis on a piece of software to understand what it does: Static (Source Code) Analysis – Analyzing the source of the malware. Typically this involves reverse engineering the binary executable. This can be problematic in some countries due to overly restrictive laws regarding software. Runtime (Behavioural) Analysis - Observation of network traffic and any changes made to the operating system environment as the executable runs. This method is riskier than static analysis due to the fact that the host is intentionally compromised during the process. The first method, known as static analysis, requires special skill sets, including an extensive understanding of assembler (usually for the x86 chipset), software debugging techniques, and increasingly a solid understanding of encryption methods. Typically this level of skill means hiring a specialist, so reversing malware has generally been left to the anti-virus companies and various security research labs. As malware becomes increasingly advanced however, industries with high need for security (such as the aerospace or pharmaceutical industries for example) are beginning to employ in-house researchers with these skills. The second technique, referred to as run time analysis, has a significantly lower cost associated with it since it does not specifically require a need for a specialist. This process involves gaining a solid understanding of what a piece of software does from simply observing the system prior to, during, and after it has been successfully run. The experience needed to perform these tasks may already be available within the IT staff of an organization. It is for this type of analysis that a sandnet is used.
  22. Many enterprises are familiar with the concept of a sandbox, or testing, host. These are often used to isolate new code, server software, or even operating systems, from the production environment. As its name implies, a sandnet expands this concept beyond a single host, to an entire network dedicated to testing and analysis. When used to analyze malicious software, all network traffic utilized by the malware sample that is undergoing analysis is generally logged and can be examined.
  23. Online sandnet labs provide an easy way for an organization to begin gaining useful information about a piece of malware. Because the entity providing the lab runs the infrastructure, there's little overhead involved for the end user. However, this also means that an organization using an online lab is potentially handing over what may be sensitive information to a 3rd party with whom it may not have any agreements in place to protect that data. Even if no sensitive data is being provided, the entity running the sandnet is in a position to be aware of the fact that a compromise may have occurred, which is problematic from a security, PR, and potentially legal perspective (for example, notification requirements etc.).
  24. The first factor an organization must consider when setting up a sandnet is whether to use physical or virtual machines for the purpose. Many features of virtualized environments are ideal for the tasks a sandnet requires, because the analyst is able to use technologies such as cloning to easily create victim and services hosts as needed. Further, with the use of snapshots, it is a fairly simple process to boot up a clean virtual host, analyze a given piece of malware, and then restore the environment to its initial state once the evaluation has been completed. Additionally, depending on the virtual machine technology being used, there may be other features available which are useful for analysis, some of which we'll discuss in a minute. Given these advantages, it seems a natural choice to use a virtualized environment to perform malware analysis. There are a few reasons that a virtual host may be undesirable as the analysis platform however, one of the most important being that the malware being analyzed may be checking to see if it is being run in a virtual machine.
  25. A key factor to consider when determining whether to use a virtual host or a bare metal machine as a victim is the fact that malware is increasingly utilizing mechanisms to determine whether or not it is being run inside a virtual machine. There are a number of techniques that can be used to do this. These range from something as simple as checking to see if the hard drive volume name, or network card MAC matches default virtual machine settings, to more esoteric solutions involving differences in the way the kernel handles functions inside a virtual environment, etc. (For examples of these refer to Joanna Rutkowska’s RedPill, and Tobias Klein’s Scoopy NG) As the malicious software industry grows, a number of design tools have been created to assist in creating malware. Some of these are quite advanced, and rival (or even exceed at times) commercial software design tools in the quality of the user interface. This means that enabling a malicious software executable to perform virtual machine detection may literally be as easy as clicking a checkbox. Because Sun’s VirtualBox product often escapes notice from malware authors, it was chosen as the platform to be used.
  26. At a minimum, a sandnet should have two hosts, one to provide services such as DNS, HTTP, and monitoring capabilities, and one to serve as a victim host, upon which the malware sample will be run. For the purposes of this document, the services host was set up with the Debian distribution of Linux. The victim host OS is Windows XP Service Pack 3. No patches other than the service pack were installed. The output below shows the result of list listing the virtual machines which have been set up. The services host has been named linux. The victim host has been named winxp_sp3_01. > VBoxManage list vms VirtualBox Command Line Management Interface Version 3.0.8 (C) 2005-2009 Sun Microsystems, Inc. All rights reserved.   "linux" {ad59f194-585e-49c5-a54c-5e92322b1188} "winxp_sp3_01" {7a554f4e-6aea-42f1-a3c5-488d43f161ff}
  27. In theory, the network traffic generated by machines in the sandnet should isolated from any production network, including the public Internet. In a bare metal lab, this could be accomplished with the use of firewalls, or simply by not connecting up the hub, switch, or router used by the lab to any other equipment. The problem this presents is that, as malware uses a multiple stage infection process, it requires access to malicious servers to download the various components it needs. I haven't found a good way to do that without giving the victim host access to the internet.* * It has been suggested to me that using an IPS on outbound traffic from the victim host is one solution to this problem.
  28. In the virtual environment, each machine should be configured to use the Internal Network option. This can be verified by using the VBoxManage utility as follows: (some output has been removed to preserve clarity): >VBoxManage showvminfo winxp_sp3_01   Name: winxp_sp3_01 Guest OS: Windows XP UUID: 7a554f4e-6aea-42f1-a3c5-488d43f161ff Memory size: 512MB VRAM size: 12MB Number of CPUs: 1 NIC 1: MAC: 080027D32767, Attachment: Internal Network 'intnet',   > VBoxManage showvminfo linux   Name: linux Guest OS: Debian UUID: ad59f194-585e-49c5-a54c-5e92322b1188 Memory size: 256MB VRAM size: 12MB Number of CPUs: 1 NIC 1: MAC: 080027355D36, Attachment: Internal Network 'intnet', Note that the Internal Network has been assigned the name ‘intnet’. If you wish to enable DHCP for the sandnet, you can use the VBoxManage tool to set this up. When you do this, you’ll need to specify the network name you want the DHCP server to respond to (this can be determined using the showvminfo as demonstrated above), an IP address for the server, as well as the lower and upper IP addresses in the DHCP pool: > VBoxManage dhcpserver add --netname intnet --ip 192.168.3.1 --netmask 255.255.255.0 --lowerip 192.168.3.100 --upperip 192.168.3.250 --enable
  29. If you wish to enable DHCP for the sandnet, you can use the VBoxManage tool to set this up. When you do this, you’ll need to specify the network name you want the DHCP server to respond to (this can be determined using the showvminfo as demonstrated above), an IP address for the server, as well as the lower and upper IP addresses in the DHCP pool: > VBoxManage dhcpserver add --netname intnet --ip 192.168.3.1 --netmask 255.255.255.0 --lowerip 192.168.3.100 --upperip 192.168.3.250 --enable
  30. The VirtualBox VM environment has the capability to dump all network traffic to and from a given VM into a pcap file. This is extremely useful when analyzing malware, as using other means to capture the traffic from a virtual machine can be problematic. To enable this feature, perform the following steps: > VBoxManage modifyvm vmname –nictraceNIC# on –nictracefileNIC# filename.pcap   Note that there is no space between the –nictrace and –nictracefile command the the number of the NIC you wish to use. For example, to capture the traffic to and from the linux virtual machine using the first network adapter (which shows up as “NIC 1” when running the showvminfo command) the following command could be used: > VBoxManage modifyvm linux –nictrace1 on –nictracefile1 “C:\Users\Test\linux.pcap”   Once you’ve finished the analysis, you can disable the trace option by using the same command and specifying ‘off’: > VBoxManage modifyvm linux –nictrace1 off –nictracefile1 “C:\Users\Test\linux.pcap”
  31. named.conf include "/etc/bind/named.conf.options";   zone "." IN { type master; file "/etc/bind/db.wildcard"; }; named.conf.options options { directory "/var/cache/bind"; allow-transfer { none; }; listen-on-v6 { any; }; }; logging { channel query_log { severity info; print-time yes; file "query.log" versions 5 size 50M; }; category queries { query_log; }; }; db.wildcard $TTL 604800 @ IN SOA localhost. root.localhost. ( 2009102201 ; serial 604800 ; refresh 86400 ; retry 2419200 ; expire 604800) ; negative cache ttl   @ IN NS localhost. * IN MX 10 mail. * IN A 192.168.3.101
  32. Note that the source IP address of the request is not present, someday I’ll get around to breaking out my code skills and patch this to include it. The User-Agent string is useful, as often bots will use specific UA strings that can be used to identify which malware family it belongs to.
  33. If a piece of malware is attempting to send traffic of an unknown nature to a remote host, it may be useful to capture that information by setting up netcat to listen on the port being used by the malware and dumping any incoming data to a text file.
  34. When analyzing malware, it is likely that an analyst will discover javascript code which has been obfuscated. Before further analysis can be performed, it becomes necessary to de-obfuscate this code. To perform the task, there are a couple different methods which can be used. (A very nice summary on this process can be found in the Decoding Javascript Roundup SANS ISC diary entry at http://isc.sans.org/diary.html?storyid=2268.) See Didier's blog post (http://blog.didierstevens.com/programs/spidermonkey/) for specific information on the changes he made, as well as the source code.
  35. The Malcode Analyst Pack contains a set of utilities that are specifically designed for rapid malcode analysis. Most useful to me have been: mail server capture pot HTTP, IRC, and DNS sniffer file system and registry change monitoring
  36. Anubis: http://anubis.iseclab.org/ Norman: http://www.norman.com/microsites/nsic/ Truman http://www.secureworks.com/research/tools/truman.html Virus Total http://www.virustotal.com/ CERT.at Do-It-Yourself Kit http://cert.at/downloads/papers/mass_malware_analysis_en.html