Deep Dive into.net Malwares
|
|
|
- Natalie Mitchell
- 10 years ago
- Views:
Transcription
1 Deep Dive into.net Malwares Author: Sudeep Singh Introduction In the recent past, there has been an increase in the usage of.net based malwares. These.NET malwares are often protected using different obfuscators which make it difficult to analyze the code. In this paper, I will discuss some of the existing techniques of reversing.net binaries, explain their limitations and then discuss some of the advanced techniques, which can help us in quickly retrieving the final malicious payload. Challenges in.net Reversing.NET binaries make use of managed code. There are several tools available which allow us to decompile the code of.net binaries. However, there are also several obfuscators available which make it difficult to analyze the obfuscated code. The usage of popular Debugging and Disassembling softwares is limited to native code binaries. When it comes to managed debugging, we often need to make use of Windbg with some extensions that allow managed code debugging. Even with the availability of those managed code debugging extensions, there is very little information available on the Internet which explains how they can be leveraged for reversing packed and obfuscated.net binaries. Sandboxes which rely on behavioral analysis of malwares are often limited because these.net binaries use several anti VM and anti sandbox techniques. Usage of.net malwares in the Wild.NET malwares have been observed in the wild since several years however in the recent past there has been an increase in their usage. They are often used to infect machines with Keyloggers to steal information. Some of the popular.net based keyloggers used are
2 HawkEyeKeylogger and KeyBase..NET malwares have also been used in APT attacks. This makes it important to understand the actual malicious payload. Existing techniques of analyzing.net malwares Some of the most common techniques of analyzing.net malwares at present are: 1. Behavioral analysis in sandbox. This technique is not specific to.net malwares however often uses various tools for monitoring the file system, Windows Registry and Network activities of malwares. 2..NET profiling tools - These tools allow you to run the malware in the context of a Profiler which shows you the method names as they are called. The basic principle used by these tools is that.net methods are just in time compiled. So, by applying the API hook at the.net subroutine which is responsible performing the JIT, we can get access to the method names as and when they execute. This approach is quite similar to API trace used for native code binaries and can help in identifying the root cause of issues in some cases. 3. Using.NET Unpacking tools. These tools allow us to save the dynamically loaded Assemblies. Sometimes packed malwares will decrypt an embedded resource and then load that as an assembly. Tools such as NETUnpack and MegaDumper allow us to save these assemblies. 4. Using Decompilers like ILSpy and other free open source or commercialized Decompiler tools. They allow you to decompile the.net binary into readable source code based on the language you choose (for instance: C#) 5. Using managed debugging extensions provided for windbg. For instance: the sos extension. We will discuss this technique in more depth. At first, let us look at the above techniques and discuss their limitations.
3 Behavioral Analysis in Sandbox In most cases, malware analysts use sandboxes which make use of Opensource or Commercialized Virtualization softwares like VMWare, VirtualBox. Along with this, the sandboxes make use of several behavioral analysis tools to monitor the behavior of malwares. All of this provides several options for the malware to detect the analysis environment and not execute completely. In such cases, it is essential to do root cause analysis and identify the techniques used for evasion by these.net binaries. As an example, I will use the.net malware which is used to infect the machine with HawkEyeKeylogger. MD5 hash: 48d0afe294c de292d658c09c SHA256 hash: f3dea9da563b281f e9cf6204d0064f5d952cc987cda0fa60b 3cec771 We can confirm with CFF Explorer, that this is a.net binary. Now, let us try behavioral analysis. My analysis environment:
4 Virtualization software: VMWare Fusion OS: Win XP SP3 Network analysis tool: Wireshark File System monitoring tool: Regshot The Virtualization environment has been fairly hardened so that it is not impacted by commonly used evasion techniques. When I execute the above malware, I see no network activity or file system changes. So, we can make two conclusions: 1. Malware does not perform sufficient malicious activities. How can we confirm that? 2. Our analysis environment is evaded. How do we find the evasion techniques? One of the ways of getting complete execution is by executing the malware on a physical machine however this is not always an efficient option for an analyst especially when you have to analyze a bulk of malwares. Now, let us discuss the second analysis method of using a.net profiling tool..net Profiling Tool A.NET profiling tool allows us to see the methods compiled and also it saves the corresponding IL code. As an example we will use the KDD tool by BlackStorm which is available on reverse engineering Forums. To demonstrate the usefulness of this tool, I have selected a malware which does not execute completely in the VM. MD5 hash: f88aa343c0444dd275b0af63b56ac586 SHA256 hash: 6605d024d6616bf748a169d94aef4ecae03efef8a692bbec0bf80e47f4 3a469c
5 When we run it in.net Dumper, we can see the list of methods compiled. The binary crashes however now we have some information to identify the root cause. We can see that an assembly was loaded however its name is not available. After that, the following 2 methods were called before the crash occurred: hsmxsehmpocipyk_ufyjxcpiwzjdoi17.isvm() hsmxsehmpocipyk_ufyjxcpiwzjdoi17.forefit() From the method names, we can see that some Anti VM trick was used. The.NET profiling tool also saves the IL corresponding to above methods. We can analyze the IL however it is not easy to identify root cause of issues by disassembling IL. This is one of the limitations of.net profiling tools..net Unpacking Tools Let us consider the binary with MD5 hash: 48d0afe294c de292d658c09c from one of the previous examples. We saw that it does not execute completely. This.NET binary decrypts an embedded resource and loads that as an Assembly. We can use.net unpacking tools to dump this assembly. However, the process of dumping the assembly using these tools is not convenient. It involves the following steps: 1. Open the.net Dumping Tool. It will display a list of processes running on the system.
6 2. Execute the.net binary, which you want to unpack. 3. Refresh the list of processes in the.net dumping tool. 4. Select the process corresponding to your.net binary. 5. Select the option to dump the loaded Assembly. However, as we can see, if the binary is using an evasion technique, it will exit much before we are able to complete the above steps. This is not an efficient way of dumping the loaded Assembly. In some cases, it does work but when we are working with binaries, which use evasion techniques, this method is not useful..net Decompilers.NET Decompilers can be very useful while analyzing.net binaries since they allow us to decompile the binary into readable source code based on the language we select, for instance: C#. However, if the.net binary is obfuscated, this process can be difficult. As an example, let us open the binary with MD5 hash: 48d0afe294c de292d658c09c with ILSpy. We can see that the entry point of the.net binary is: X75FZ30kdVmXv8dakB.SEA3XhjBH3OxtGNco8.opNDqZKYO8 Below are some of the obfuscation methods used: 1. Method names are obfuscated.
7 2. Switch case obfuscation is used. This is used for control flow obfuscation. 3. Encrypted strings are used. These strings are decrypted by passing an integer parameter to the subroutine: ejlxnh8fmp(). This subroutine uses a heavy switch case obfuscation as shown below: It includes 427 different cases. Manual deobfuscation of this code is very difficult. 4. Encrypted Resource Section. We can see in the Decompiler that this binary has encrypted resources. One of these resources is a Bitmap Image, celor.din. This bitmap image will be decrypted at runtime and the resulting Assembly will be loaded dynamically. Now that we have discussed some of the common methods of reversing.net binaries, let us discuss some advanced techniques, which help in quick analysis.
8 Managed Debugging with Windbg Managed debugging with Windbg using extensions like sos or sosex is a known method. However, the use of these extensions for reversing.net malwares is not well documented on Internet. The sosex extension can be downloaded from here: 9f20- cdec75318bf5 We will use this extension for dumping the.net assembly loaded dynamically by the binary with MD5 hash: 48d0afe294c de292d658c09c. Below are the steps for doing it: 1. The sosex extension needs to be downloaded and placed in the Microsoft.NET Framework directory. In my case, I place the sosex.dll in the path: C:\WINDOWS\Microsoft.NET\Framework\v Now, we open the binary with MD5 hash: 48d0afe294c de292d658c09c with windbg. 3. We load the sosex extension in windbg using the command:.load "C:\\WINDOWS\\Microsoft.NET\\Framework\\v \\sosex. dll" 4. Now, place a breakpoint at Assembly.Load. Sosex extension provides a command!mbm which allows us to set breakpoint on methods which are JIT Compiled and those which are provided by.net Framework. We can also use wildcard characters. So, we set a breakpoint on any method matching the pattern: *Assembly.Load*
9 !mbm *Assembly.Load* When we set this breakpoint, windbg tells us that CLR has not yet been initialized and these breakpoints will be resolved at runtime. So, we run the binary in windbg now. 5. When we run the binary, CLR is initialized and windbg will place breakpoints on all the methods matching the pattern: Assembly.Load. The specific method which we want to analyze is System.Reflection.Assembly.Load(Byte[]) The byte array in above method corresponds to our decrypted Assembly. When the breakpoint at this method is hit in windbg, we see the following message: Breakpoint 13 hit eax= ebx= c ecx= c edx=014242cc esi= edi= a eip= esp=0012eeac ebp=0012eeb0 iopl=0 nv up ei pl zr na pe nc Now, if we check the value of ecx register, we can see that it corresponds to the byte array. 0:000> dd ecx c c 0000b a4d c ffff b c c c eba1f0e cd09b c 4c01b cd f c 63206d61 6f6e6e e c 206e f f6d 0a0d0d2e The second DWORD above corresponds to the size of byte array and the third DWORD corresponds to the.net assembly. To dump this assembly we can use the.writemem command as shown below:
10 .writemem Once we have dumped the assembly, let us load it with ILSpy. We can see that the method names are now meaningful. It is important to note that most.net malwares use this assembly. Let us check the method: dudokqo(). It has two variables: private static byte[] FileData; private static string injectionpath; FileData corresponds to the Assembly, which will be loaded by it, and injectionpath corresponds to the Process name in which code will be injected using the RunPE method. FileData byte array is initialized as shown below:
11 The resources section is decrypted using the Decrypt() subroutine and it is used to initialize FileData. Also, from the decrypted output above a value b is initialized as shown below: int num = (int)array[1]; int num2 = num * 5; byte b = (byte)array[4 + num2]; Based on the value of b, the variable, injectionpath is initialized using a switch case statement as shown below: We can see that the code can be injected in any one of the following processes: 1. svchost.exe 2. Applaunch.exe 3. vbc.exe 4. Regasm.exe 5. Regsvcs.exe Now, we need to find the decrypted assembly, which is injected into one of the above processes. The decryption routine is as shown below:
12 We could manually decrypt the resource section using the above subroutine, however, a more efficient method would be to do it dynamically using the sosex extension of Windbg. We saw previously that the Decrypted output will be passed as a parameter to Pack.Deserialize() So, let us set a breakpoint at all the methods matching the pattern: *Pack.Deserialize* We once again open the binary with MD5 hash: 48d0afe294c de292d658c09c in windbg, load the sosex extension and set a breakpoint at *Pack.Deserialize*. When we run the binary, CLR is initialized. As soon as the above method is compiled using JIT, the debugger receives a notification and the breakpoint is hit as shown below: Breakpoint: JIT notification received for method ssalclldym.pack.deserialize(byte[]) in AppDomain 0015d958. Breakpoint set at ssalclldym.pack.deserialize(byte[]) in AppDomain 0015d958. Breakpoint 1 hit eax=00a29640 ebx=024ba3a8 ecx= edx=0253c648 esi=0253c648 edi= eip=00dcc671 esp=0012e65c ebp=0012e66c iopl=0 nv up ei pl nz na pe nc cs=001b ss=0023 ds=0023 es=0023 fs=003b gs=0000 efl= Now, let us display the contents of edx register.
13 We can see that the second DWORD corresponds to the size of Decrypted Assembly corresponds to the Decrypted Assembly. So, we can dump it using the.writemem command as shown below:.writemem Please note that the above technique is undocumented. Now, let us load the decrypted assembly with ILSpy once again: We can see that now we have the final decrypted payload and it corresponds to a Key Logger. More about this will be discussed later. Alternate methods of loading the Assembly Let us now discuss another.net malware with MD5 hash: f88aa343c0444dd275b0af63b56ac586 This malware uses a different method of loading the Assembly. Below is the decompiled output of Main Subroutine in ILSpy:
14 We can see that it decrypts an embedded resource with name: tptyro and loads the decrypted assembly using the method: AppDomain.CurrentDomain.Load() Previously we saw that this.net malware does not execute completely in the VM. To identify the root cause, we need to dump the decrypted assembly. We open the binary with windbg, load the sosex extension and set a breakpoint using the command:!mbm *AppDomain.Load* When we run the binary, CLR is initialized and the breakpoints are resolved. There are multiple methods matching the above pattern. We hit the breakpoint at method: System.AppDomain.Load(Byte[], Byte[]) Let us display the value of edx register: 0:000> dd edx c a4d ffff b eba1f0e cd09b a0 4c01b cd f b d61 6f6e6e e757220
15 023532c0 206e f f6d 0a0d0d2e We can see that second DWORD corresponds to size of decrypted Assembly and third DWORD corresponds to the Assembly. We save this assembly using the.writemem command as shown below:.writemem Let us decompile the decrypted assembly with ILSpy. Previously we saw with the.net profiling tool that the binary crashes after calling the following 2 methods: hsmxsehmpocipyk_ufyjxcpiwzjdoi17.isvm() hsmxsehmpocipyk_ufyjxcpiwzjdoi17.forefit() These methods correspond to the decrypted Assembly. Now, we can understand the root cause of the crash. We can see in the code of isvm() below that it uses WMI query to check the description of Video Controller of the machine: ManagementObjectSearcher managementobjectsearcher = new ManagementObjectSearcher("root\\CIMV2", "SELECT * FROM Win32_VideoController");
16 It compares the Description field with the following: 1. virtual 2. vmware 3. parallel 4. vm additions 5. remotefx 6. generic 7. cirrus logic 8. standard vga 9. matrox If the description field matches any of the above then it sets the result field to true. We can see in the method: ssdbkp_urmbhsbgrnd13 that it calls the isvm() method and if the return value is true, it calls Forefit method. public static bool ssdbkp_urmbhsbgrnd13() { if (hsmxsehmpocipyk_ufyjxcpiwzjdoi17.isvm()) { hsmxsehmpocipyk_ufyjxcpiwzjdoi17.forefit(); } Let us check the code of Forefit().
17 We can see that this is a recursive function, which is used to introduce delay in execution. It increments the variable num3 from 1 to and then resets this variable to 1 before executing the loop again. In this way, we know the root cause of why the binary does not execute completely in the VM. Hawk Eye Keylogger Analysis Using the methods discussed previously, we can decrypt the actual malicious payload, which is used to perform Key Logging Activities. Hawk Eye Keylogger is available on the website: In addition to Key Logging activity, it also allows the information to be stolen from Clients and Web Browsers on the victim's machine. This information can be sent to attackers either using FTP, SMTP or uploaded to the PHP based Web Panel. Since we have the complete decrypted payload, we can understand how the key logging activities are performed.
18 Below are the steps used for Key Logging: 1. The HookKeyboard function calls SetWindowHookEx with the idhook parameter set to 13, which corresponds to WH_KEYBOARD_LL. The Callback procedure for monitoring key board inputs is KeyboardCallback(). 2. The parameters passed to the Callback function are documented here: us/library/windows/desktop/ms644985%28v=vs.85%29.aspx We can see in the callback function code that it checks the Window Message type and checks if it is equal to 256 or 260. The corresponding Window Message names can be found using the reference here: So, the callback function checks whether the Window Message corresponds to WM_KEYDOWN or WM_SYSKEYDOWN. 3. After performing the above validation, it checks the Virtual Key code by inspecting the parameter, lparam.vkcode. This value corresponds to the ASCII value of the key pressed. In the switch case statement, based on the ASCII value of key pressed, it constructs the output variable, text as shown below:
19 Now, let us look at how the Hawk Eye Keylogger steals the information from Clients and Web Browsers. In the StartStealers() function we can see that it accesses two values from the Resources Section. this.mail = Resources.mailpv; this.wb = Resources.WebBrowserPassView; Two new threads are started corresponding to the functions: stealmail() and stealwebbrowsers()
20 The stealmail() function loads an assembly from the resource section and uses LateBinding to call the Run Method in it passing it the corresponding parameters. Similarly, the stealwebbrowsers() function loads the assembly from resource section and calls the Run Method passing it parameters corresponding to Web Browsers. The files holdermail.txt and holderwb.txt correspond to files, which store information stolen from Clients and Web Browsers. The assembly loaded above by stealmail() and stealwebbrowsers() function corresponds to CMemoryExecute.
21 We can dump this Assembly using the methods discussed previously. We can view the Run Method of CMemoryExecute in ILSpy. The Run Method allows code to be injected in another process by calling the following sequence of APIs: CreateProcess() NtUnmapViewOfSection() VirtualAllocEx() NtWriteVirtualMemory() NtGetThreadContext() NtWriteVirtualMemory() NtSetThreadContext() NtResumeThread() This method of code injection is commonly known as RunPE. Also, based on the parameters passed to Run method of CMemoryExecute from the decrypted assembly, we can see that it is used to inject code in vbc.exe process. The two resources described previously, mailpv and WebBrowserPassView can be saved as well. These two files correspond to Nirsoft's Mail Password Recovery and Nirsoft's Web Browser Pass View as shown below:
22
23 Data Exfiltration Hawk Eye Keylogger provides 3 different options for sending the information from victim's computer to attacker. They can use FTP, SMTP or PHP based web panel. We can see the following variables declared in the decrypted assembly: private string encrypted string; private string encryptedpassstring; private string encryptedsmtpstring; private string encryptedftphost; private string encryptedftpuser; private string encryptedftppass; private string encryptedphplink; In the Form1() method, these values are defined as shown below: In the Form1_Load() method, these values are decrypted as shown below: The decryption key used is: HawkEyeKeylogger. The decryption routine is as shown below:
24 KeyBase Key Logger There is another Key Logger similar to Hawk Eye Keylogger, which uses.net binaries as well. MD5 hash: ff2bad77e9c9dc4dfd787cf7ca035ca8 The final decrypted payload can be decompiled with ILSpy. We can see in the subroutine: PasswordRecovery() that it supports stealing credentials from multiple softwares:
25 From the following clients: 1. Outlook. 2. Netscape 3. Thunderbird 4. Eudora 5. Incredimail And the following Browsers: 1. FireFox 2. Chrome 3. Internet Explorer 4. Opera 5. Safari And the following softwares: 1. FileZilla
26 2. IMVU 3. Internet Download Manager 4. JDownloader 5. Paltalk Data Exfiltration Information related to Callback URL and File System Artifacts is as shown below: We can see that information will be collected from system and sent to: Unlike Hawk Eye Keylogger, the data is exfiltrated by KeyBase Keylogger to Attacker controlled Web Server. In the SendLog function we can see that data is exfiltrated based on the LogType.
27 It could be any one of the following: 1. Keystrokes 2. Passwords 3. Clipboard 4. Screenshot As shown in the screenshot above, the URL pattern is specific to the type of information being exfiltrated. Conclusion We saw in this paper how.net malwares can be analyzed quickly and more efficiently by leveraging Windbg's managed debugging capability. This allows us to understand the capabilities of the malware as well as different evasion techniques used. It can also be seen that.net malware authors give a lot of importance to packing and obfuscation in their code to prevent reverse engineering using Decompilers.
Automating Linux Malware Analysis Using Limon Sandbox Monnappa K A [email protected]
Automating Linux Malware Analysis Using Limon Sandbox Monnappa K A [email protected] A number of devices are running Linux due to its flexibility and open source nature. This has made Linux platform
Sandy. The Malicious Exploit Analysis. http://exploit-analysis.com/ Static Analysis and Dynamic exploit analysis. Garage4Hackers
Sandy The Malicious Exploit Analysis. http://exploit-analysis.com/ Static Analysis and Dynamic exploit analysis About Me! I work as a Researcher for a Global Threat Research firm.! Spoke at the few security
«Как найти 0-day в браузере» Бажанюк Александр @Abazhanyuk [email protected]
«Как найти 0-day в браузере» Бажанюк Александр @Abazhanyuk [email protected] Who am i? - BitBlaze Core Research Team http://bitblaze.cs.berkeley.edu/ - DefCon-UA - Hack In The Box 2012: http://conference.hitb.org/hitbsecconf2012ams/alex-bazhanyuk-nikita-tarakanov/
From Georgia, with Love Win32/Georbot. Is someone trying to spy on Georgians?
From Georgia, with Love Win32/Georbot Is someone trying to spy on Georgians? At the beginning of the year, a curious piece of malware came to our attention. An analyst in our virus laboratory noticed that
Hijacking Arbitrary.NET Application Control Flow. Topher Timzen
Hijacking Arbitrary.NET Application Control Flow Topher Timzen #whoami Topher Timzen Security Researcher, Intel Security Trainer @TTimzen TopherTimzen.com Overview.NET? Runtime Attacks Modify Control Flow
Fighting malware on your own
Fighting malware on your own Vitaliy Kamlyuk Senior Virus Analyst Kaspersky Lab [email protected] Why fight malware on your own? 5 reasons: 1. Touch 100% of protection yourself 2. Be prepared
Latest Business Email Compromise Malware Found: Olympic Vision
A TrendLabs Report Latest Business Email Compromise Malware Found: Olympic Vision Technical Brief TrendLabs Security Intelligence Blog Jaaziel Carlos Junestherry Salvador March 2016 Introduction Olympic
MALWARE TOOLS FOR SALE ON THE OPEN WEB
MALWARE TOOLS FOR SALE ON THE OPEN WEB May 2014 RSA Research, while investigating a Zeus Trojan sample, discovered an additional drop server used by a fraudster who is offering a set of spyware tools for
Online Payments Threats
July 3, 2012 Introduction...2 Tested Products...2 Used Configuration...3 Real Malware Inspiration...3 Total Scores Chart...4 Conclusion...4 About matousec.com...4 Detailed Descriptions of Tests...5 Detailed
Parasitics: The Next Generation. Vitaly Zaytsev Abhishek Karnik Joshua Phillips
Parasitics: The Next Generation. Vitaly Zaytsev Abhishek Karnik Joshua Phillips Agenda Overview W32/Xpaj analysis Overview of a virtual machine Software protection trends W32/Winemmem analysis W32/Induc
This report is a detailed analysis of the dropper and the payload of the HIMAN malware.
PAGE 5 Check Point Malware Research Group HIMAN Malware Analysis December 12, 2013 Researcher: Overview This report is a detailed analysis of the dropper and the payload of the HIMAN malware. This malware
Storm Worm & Botnet Analysis
Storm Worm & Botnet Analysis Jun Zhang Security Researcher, Websense Security Labs June 2008 Introduction This month, we caught a new Worm/Trojan sample on ours labs. This worm uses email and various phishing
Windows PowerShell Cookbook
Windows PowerShell Cookbook Lee Holmes O'REILLY' Beijing Cambridge Farnham Koln Paris Sebastopol Taipei Tokyo Table of Contents Foreword Preface xvii xxi Part I. Tour A Guided Tour of Windows PowerShell
Detecting Malware With Memory Forensics. Hal Pomeranz SANS Institute
Detecting Malware With Memory Forensics Hal Pomeranz SANS Institute Why Memory Forensics? Everything in the OS traverses RAM Processes and threads Malware (including rootkit technologies) Network sockets,
CopyKittens Attack Group
CopyKittens Attack Group Version 1.0 23/11/2015 All Rights Reserved To Minerva Labs LTD and ClearSky Cyber Security, 2015 Contents Executive Summary... 3 The Group Attack Cycle... 4 Step One Spear Phishing...
Adi Hayon Tomer Teller
Adi Hayon Tomer Teller Why are we here? (one of many reasons) A malicious program: Allocates memory in a remote process (and write to it) Executes the code in that memory region Frees the code Memory dump
VISA SECURITY ALERT December 2015 KUHOOK POINT OF SALE MALWARE. Summary. Distribution and Installation
VISA SECURITY ALERT December 2015 KUHOOK POINT OF SALE MALWARE Distribution: Merchants, Acquirers Who should read this: Information security, incident response, cyber intelligence staff Summary Kuhook
The Value of Physical Memory for Incident Response
The Value of Physical Memory for Incident Response MCSI 3604 Fair Oaks Blvd Suite 250 Sacramento, CA 95864 www.mcsi.mantech.com 2003-2015 ManTech Cyber Solutions International, All Rights Reserved. Physical
Melde- und Analysestelle Informationssicherung MELANI Torpig/Mebroot Reverse Code Engineering (RCE)
Melde- und Analysestelle Informationssicherung MELANI Torpig/Mebroot Reverse Code Engineering (RCE) Andreas Greulich, MELANI Swiss Cyber Storm, 18 April 2009 Agenda Part 1: Introduction (~5 ) Infection
Security Evaluation CLX.Sentinel
Security Evaluation CLX.Sentinel October 15th, 2009 Walter Sprenger [email protected] Compass Security AG Glärnischstrasse 7 Postfach 1628 CH-8640 Rapperswil Tel.+41 55-214 41 60 Fax+41 55-214 41
File Disinfection Framework (FDF) Striking back at polymorphic viruses
File Disinfection Framework (FDF) Striking back at polymorphic viruses 1 CONTENTS Introduction 3 File Disinfection Framework (FDF) 4 Disinfection solution development today 5 Goals 6 Target audience 6
Detecting the One Percent: Advanced Targeted Malware Detection
Detecting the One Percent: Advanced Targeted Malware Detection Tomer Teller Check Point Software Technologies Session ID: SP02-T19 Session Classification: Intermediate Antivirus 20 th+ Anniversary The
Operation Liberpy : Keyloggers and information theft in Latin America
Operation Liberpy : Keyloggers and information theft in Latin America Diego Pérez Magallanes Malware Analyst Pablo Ramos HEAD of LATAM Research Lab 7/7/2015 version 1.1 Contents Introduction... 3 Operation
Networks and Security Lab. Network Forensics
Networks and Security Lab Network Forensics Network Forensics - continued We start off from the previous week s exercises and analyze each trace file in detail. Tools needed: Wireshark and your favorite
Attacking Obfuscated Code with IDA Pro. Chris Eagle
Attacking Obfuscated Code with IDA Pro Chris Eagle Outline Introduction Operation Demos Summary 2 First Order Of Business MOVE UP AND IN! There is plenty of room up front I can't increase the font size
Diving into a Silverlight Exploit and Shellcode - Analysis and Techniques
Diving into a Silverlight Exploit and Shellcode - Analysis and Techniques By Omri Herscovici & Liran Englender January 04, 2015 Preface In recent years, exploit-kits are one of the most common platforms
Security Intelligence Services. Cybersecurity training. www.kaspersky.com
Kaspersky Security Intelligence Services. Cybersecurity training www.kaspersky.com CYBERSECURITY TRAINING Leverage Kaspersky Lab s cybersecurity knowledge, experience and intelligence through these innovative
WildFire Reporting. WildFire Administrator s Guide 55. Copyright 2007-2015 Palo Alto Networks
WildFire Reporting When malware is discovered on your network, it is important to take quick action to prevent spread of the malware to other systems. To ensure immediate alerts to malware discovered on
WWA FTP/SFTP CONNECTION GUIDE KNOW HOW TO CONNECT TO WWA USING FTP/SFTP
WWA FTP/SFTP CONNECTION GUIDE KNOW HOW TO CONNECT TO WWA USING FTP/SFTP Table OF Contents WWA FTP AND SFTP CONNECTION GUIDE... 3 What is FTP:... 3 What is SFTP:... 3 Connection to WWA VIA FTP:... 4 FTP
Deep Discovery. Technical details
Deep Discovery Technical details Deep Discovery Technologies DETECT Entry point Lateral Movement Exfiltration 360 Approach Network Monitoring Content Inspection Document Emulation Payload Download Behavior
TLP: GREEN FBI. FBI Liaison Alert System # A-000049-MW
Liaison Alert System # A-000049-MW The following information was obtained through investigation and is provided in conjunction with the s statutory requirement to conduct victim notification as outlined
Inside a killer IMBot. Wei Ming Khoo University of Cambridge 19 Nov 2010
Do you? or Inside a killer IMBot Wei Ming Khoo University of Cambridge 19 Nov 2010 Background Tracking a botnet propagating over Skype & Yahoo IM. Bait is Foto Exploits social connectivity (friend
Microsoft.NET Passport, a solution of single sign on
Microsoft.NET Passport, a solution of single sign on Zheng Liu Department of Computer Science University of Auckland [email protected] Abstract: As the World Wide Web grows rapidly, accessing web-based
Introduction. Figure 1 Schema of DarunGrim2
Reversing Microsoft patches to reveal vulnerable code Harsimran Walia Computer Security Enthusiast 2011 Abstract The paper would try to reveal the vulnerable code for a particular disclosed vulnerability,
Online Vulnerability Scanner Quick Start Guide
Online Vulnerability Scanner Quick Start Guide Information in this document is subject to change without notice. Companies, names, and data used in examples herein are fictitious unless otherwise noted.
Enterprise Application Security Workshop Series
Enterprise Application Security Workshop Series Phone 877-697-2434 fax 877-697-2434 www.thesagegrp.com Defending JAVA Applications (3 Days) In The Sage Group s Defending JAVA Applications workshop, participants
Malware Analysis Report
NSHC 2014. 02. 20 Malware Analysis Report [ Xtreme RAT ] A server program of Xtreme RAT, a type of RAT (Remote Administration Tool), is distributed recently. The system which is infected with the server
TZWorks Windows Event Log Viewer (evtx_view) Users Guide
TZWorks Windows Event Log Viewer (evtx_view) Users Guide Abstract evtx_view is a standalone, GUI tool used to extract and parse Event Logs and display their internals. The tool allows one to export all
Integrated Virtual Debugger for Visual Studio Developer s Guide VMware Workstation 8.0
Integrated Virtual Debugger for Visual Studio Developer s Guide VMware Workstation 8.0 This document supports the version of each product listed and supports all subsequent versions until the document
Reverse Engineering and Computer Security
Reverse Engineering and Computer Security Alexander Sotirov [email protected] Introduction Security researcher at Determina, working on our LiveShield product Responsible for vulnerability analysis and
Detecting and Exploiting XSS with Xenotix XSS Exploit Framework
Detecting and Exploiting XSS with Xenotix XSS Exploit Framework [email protected] keralacyberforce.in Introduction Cross Site Scripting or XSS vulnerabilities have been reported and exploited since 1990s.
TitanMist: Your First Step to Reversing Nirvana TitanMist. mist.reversinglabs.com
TitanMist: Your First Step to Reversing Nirvana TitanMist mist.reversinglabs.com Contents Introduction to TitanEngine.. 3 Introduction to TitanMist 4 Creating an unpacker for TitanMist.. 5 References and
G DATA SECURITYLABS CASE STUDY OPERATION TOOHASH HOW TARGETED ATTACKS WORK
G DATA SECURITYLABS CASE STUDY OPERATION TOOHASH HOW TARGETED ATTACKS WORK CONTENTS Executive Summary... 2 The Malware used 2 Information Stealing 2 Campaign Analysis... 3 Targets 3 Spear Phishing Campaign
Format string exploitation on windows Using Immunity Debugger / Python. By Abysssec Inc WwW.Abysssec.Com
Format string exploitation on windows Using Immunity Debugger / Python By Abysssec Inc WwW.Abysssec.Com For real beneficiary this post you should have few assembly knowledge and you should know about classic
Securing Secure Browsers
Securing Secure Browsers SESSION ID: TRM-T11 Prashant Kumar Verma Sr. Consultant & Head (Security Testing) Paladion Networks @prashantverma21 Agenda Browser Threats Secure Browsers to address threats Secure
Privacy Scrubber: Means to Obfuscate Personal Data from Benign Application Leakage
Privacy Scrubber: Means to Obfuscate Personal Data from Benign Application Leakage Michael Walker Youngstown State University One University Plaza Youngstown, Oh 44555 USA 1.877.468.6978 [email protected]
Alert (TA14-212A) Backoff Point-of-Sale Malware
Alert (TA14-212A) Backoff Point-of-Sale Malware Original release date: July 31, 2014 Systems Affected Point-of-Sale Systems Overview This advisory was prepared in collaboration with the National Cybersecurity
A more comprehensive version of this material was published in the October issue of the Virus Bulletin magazine [3].
INSIDE A BLACK HOLE By Gabor Szappanos, Principal Researcher, SophosLabs Introduction Without exception the most actively deployed exploit kit in the past year was the Blackhole exploit kit. [1]. Now that
Chapter 14 Analyzing Network Traffic. Ed Crowley
Chapter 14 Analyzing Network Traffic Ed Crowley 10 Topics Finding Network Based Evidence Network Analysis Tools Ethereal Reassembling Sessions Using Wireshark Network Monitoring Intro Once full content
LASTLINE WHITEPAPER. In-Depth Analysis of Malware
LASTLINE WHITEPAPER In-Depth Analysis of Malware Abstract Malware analysis is the process of determining the purpose and functionality of a given malware sample (such as a virus, worm, or Trojan horse).
Introducing the.net Framework 4.0
01_0672331004_ch01.qxp 5/3/10 5:40 PM Page 1 CHAPTER 1 Introducing the.net Framework 4.0 As a Visual Basic 2010 developer, you need to understand the concepts and technology that empower your applications:
Redline Users Guide. Version 1.12
Redline Users Guide Version 1.12 Contents Contents 1 About Redline 5 Timeline 5 Malware Risk Index (MRI) Score 5 Indicators of Compromise (IOCs) 5 Whitelists 5 Installation 6 System Requirements 6 Install
IDS and Penetration Testing Lab IIIa
IDS and Penetration Testing Lab IIIa Dissecting a Botnet C&C - rbot Triggering Lab Malware operation Upon execution malware connects to botirc.net server and establishes standard IRC session with #test
Pcounter Web Report 3.x Installation Guide - v2014-11-30. Pcounter Web Report Installation Guide Version 3.4
Pcounter Web Report 3.x Installation Guide - v2014-11-30 Pcounter Web Report Installation Guide Version 3.4 Table of Contents Table of Contents... 2 Installation Overview... 3 Installation Prerequisites
Fine-grained covert debugging using hypervisors and analysis via visualization
Reverse Engineering by Crayon: Game Changing Hypervisor and Visualization Analysis Fine-grained covert debugging using hypervisors and analysis via visualization Daniel A. Quist Lorie M. Liebrock Offensive
What do a banking Trojan, Chrome and a government mail server have in common? Analysis of a piece of Brazilian malware
What do a banking Trojan, Chrome and a government mail server have in common? Analysis of a piece of Brazilian malware Contents Introduction.................................2 Installation: Social engineering
Introduction to Reverse Engineering
Introduction to Reverse Engineering Inbar Raz Malware Research Lab Manager December 2011 What is Reverse Engineering? Reverse engineering is the process of discovering the technological principles of a
AGENDA. Background. The Attack Surface. Case Studies. Binary Protections. Bypasses. Conclusions
MOBILE APPLICATIONS AGENDA Background The Attack Surface Case Studies Binary Protections Bypasses Conclusions BACKGROUND Mobile apps for everything == lots of interesting data Banking financial Social
Persist It Using and Abusing Microsoft s Fix It Patches
Persist It Using and Abusing Microsoft s Fix It Patches Jon Erickson : isight Partners : [email protected] Abstract: Microsoft has often used Fix it patches, which are a subset of Application
Uroburos Highly complex espionage software with Russian roots
G Data Red Paper 2014 Uroburos Highly complex espionage software with Russian roots G Data discovers alleged intelligence agency software G Data SecurityLabs Contact: [email protected] Red Paper_February-2014
Hide and seek - how targeted attacks hide behind clean applications Szappanos Gábor
Hide and seek - how targeted attacks hide behind clean applications Szappanos Gábor Principal Malware Researcher 1 Honourable mentions: 2010. Stuxnet digitally signed drivers: stolen certificate June 2012.
If you examine a typical data exchange on the command connection between an FTP client and server, it would probably look something like this:
Overview The 1756-EWEB and 1768-EWEB modules implement an FTP server; this service allows users to upload custom pages to the device, as well as transfer files in a backup or restore operation. Many IT
This is DEEPerent: Tracking App behaviors with (Nothing changed) phone for Evasive android malware
This is DEEPerent: Tracking App behaviors with (Nothing changed) phone for Evasive android malware What I will talk about.. Challenges we faced on android malware analysis: Fast code analysis (Reversing)
TECHNICAL BULLETIN [ 1 / 5 ]
TECHNICAL BULLETIN [ 1 / 5 ] [Title] Corrective action when MELSOFT products cannot be installed on a personal computer on which the 6th Generation Intel Core Processor has been installed [Date of Issue]
Bug hunting. Vulnerability finding methods in Windows 32 environments compared. FX of Phenoelit
Bug hunting Vulnerability finding methods in Windows 32 environments compared FX of Phenoelit The goal: 0day What we are looking for: Handles network side input Runs on a remote system Is complex enough
ABSTRACT' INTRODUCTION' COMMON'SECURITY'MISTAKES'' Reverse Engineering ios Applications
Reverse Engineering ios Applications Drew Branch, Independent Security Evaluators, Associate Security Analyst ABSTRACT' Mobile applications are a part of nearly everyone s life, and most use multiple mobile
Certificates and SSL
SE425: Communication and Information Security Recitation 12 Semester 2 5775 17 June 2015 Certificates and SSL In this recitation we ll see how to use digital certificates for email signing and how to use
So You Want To Analyze Malware? Tools, Techniques, and Mindset
So You Want To Analyze Malware? Tools, Techniques, and Mindset Introduction Who, What, Why? Introduction Me Wes Brown Software and Systems Hacker Fond of Lisp-based and Functional Languages Developed Lisp
Spy Eye and Carberp the new banker trojans offensive
Spy Eye and Carberp the new banker trojans offensive The common way for a wanna-be hacker to fulfill his sick aspirations is to achieve a known trojan there is a plenty on the Internet, sometimes they
Shaw Secure Powered by McAfee Registration and Installation
OVERVIEW This document will guide you through the process of account registration, downloading, and installing Shaw Secure Powered by McAfee. If you experience any challenges with the software installation
C#5.0 IN A NUTSHELL. Joseph O'REILLY. Albahari and Ben Albahari. Fifth Edition. Tokyo. Sebastopol. Beijing. Cambridge. Koln.
Koln C#5.0 IN A NUTSHELL Fifth Edition Joseph Albahari and Ben Albahari O'REILLY Beijing Cambridge Farnham Sebastopol Tokyo Table of Contents Preface xi 1. Introducing C# and the.net Framework 1 Object
ASL IT SECURITY XTREME XPLOIT DEVELOPMENT
ASL IT SECURITY XTREME XPLOIT DEVELOPMENT V 2.0 A S L I T S e c u r i t y P v t L t d. Page 1 Overview: The most dangerous threat is the one which do not have a CVE. Until now developing reliable exploits
PRACTICAL MALWARE ANALYSIS Kris Kendall [email protected]
PRACTICAL MALWARE ANALYSIS Kris Kendall [email protected] WHY PERFORM MALWARE ANALYSIS? What are some of the reasons that one might want to invest the (sometimes significant) resources required
A perspective to incident response or another set of recommendations for malware authors
A perspective to incident response or another set of recommendations for malware authors Alexandre Dulaunoy - TLP:WHITE [email protected] June 7, 2013 CIRCL, national CERT of Luxembourg CIRCL
Hotpatching and the Rise of Third-Party Patches
Hotpatching and the Rise of Third-Party Patches Alexander Sotirov [email protected] BlackHat USA 2006 Overview In the next one hour, we will cover: Third-party security patches _ recent developments
Cyber Security in Taiwan's Government Institutions: From APT To. Investigation Policies
Cyber Security in Taiwan's Government Institutions: From APT To Investigation Policies Ching-Yu, Hung Investigation Bureau, Ministry of Justice, Taiwan, R.O.C. Abstract In this article, we introduce some
Bitrix Site Manager ASP.NET. Installation Guide
Bitrix Site Manager ASP.NET Installation Guide Contents Introduction... 4 Chapter 1. Checking for IIS Installation... 5 Chapter 2. Using An Archive File to Install Bitrix Site Manager ASP.NET... 7 Preliminary
1 Recommended Readings. 2 Resources Required. 3 Compiling and Running on Linux
CSC 482/582 Assignment #2 Securing SimpleWebServer Due: September 29, 2015 The goal of this assignment is to learn how to validate input securely. To this purpose, students will add a feature to upload
Introduction. Application Security. Reasons For Reverse Engineering. This lecture. Java Byte Code
Introduction Application Security Tom Chothia Computer Security, Lecture 16 Compiled code is really just data which can be edit and inspected. By examining low level code protections can be removed and
Passcape Software. DPAPI flaw. Vulnerability of DPAPI data protection in Win2K, Win2K3, Windows Server 2008, and Windows Server 2012
DPAPI flaw Vulnerability of DPAPI data protection in Win2K, Win2K3, Windows Server 2008, and Windows Server 2012 Content 1 Brief description of the vulnerability 2 1.1 The... problem 2 1.2 Affected...
Penetration Testing with Kali Linux
Penetration Testing with Kali Linux PWK Copyright 2014 Offensive Security Ltd. All rights reserved. Page 1 of 11 All rights reserved to Offensive Security, 2014 No part of this publication, in whole or
INTRODUCTION TO MALWARE & MALWARE ANALYSIS
INTRODUCTION TO MALWARE & MALWARE ANALYSIS by Quick Heal R&D lab Security Simplified INTRODUCTION Very often people call everything that corrupts their system a virus without being aware about what it
FIREEYE THREAT INTELLIGENCE HAMMERTOSS: Stealthy Tactics Define a Russian Cyber Threat Group JULY 2015 SECURITY REIMAGINED
S P E C I A L R E P O R T FIREEYE THREAT INTELLIGENCE HAMMERTOSS: Stealthy Tactics Define a Russian Cyber Threat Group JULY 205 SECURITY REIMAGINED CONTENTS HAMMERTOSS 3 APT29 5 Introducing HAMMERTOSS
All Your Code Belongs To Us Dismantling Android Secrets With CodeInspect. Steven Arzt. 04.10.2015 Secure Software Engineering Group Steven Arzt 1
All Your Code Belongs To Us Dismantling Android Secrets With CodeInspect Steven Arzt 04.10.2015 Secure Software Engineering Group Steven Arzt 1 04.10.2015 Secure Software Engineering Group Steven Arzt
Spyware Analysis. [email protected]. Security Event - April 28, 2004 Page 1
Spyware Analysis [email protected] Security Event - April 28, 2004 Page 1 Content Definition & types of spyware Statistics Hooks Static vs. dynamic software analysis Test environment for spyware Analysis
PE Explorer. Heaventools. Malware Code Analysis Made Easy
Heaventools PE Explorer Data Sheet Malware Code Analysis Made Easy Reverse engineers within the anti-virus, vulnerability research and forensics companies face the challenge of analysing a large number
Crystal Reports.Net 1.1 Patch
Crystal Reports.Net 1.1 Patch Hot Fix: crnet11win_en.zip Language: English Platform: Windows Last updated on: 4/4/2008 FTP Location: ftp://ftp1.businessobjects.com/outgoing/chf/crnet11win_en.zip WARNING:
Physical Memory Standard Operating Procedures
MORGAN STANLEY Physical Memory Standard Operating Procedures HBGary Memory Forensic Tools Phil Wallisch 5/11/2010 This document details the procedures that Morgan Stanley CERT will perform to acquire and
WildFire Overview. WildFire Administrator s Guide 1. Copyright 2007-2015 Palo Alto Networks
WildFire Overview WildFire provides detection and prevention of zero-day malware using a combination of malware sandboxing and signature-based detection and blocking of malware. WildFire extends the capabilities
Self Protection Techniques in Malware
DSIE 10 5 th Doctoral lsymposium on Informatics Engineering i January 28 29, 2010 Porto, Portugal Self Protection Techniques in Malware Tiago Santos Overview Introduction Malware Types Why Self Protection?
Click Studios. Passwordstate. Installation Instructions
Passwordstate Installation Instructions This document and the information controlled therein is the property of Click Studios. It must not be reproduced in whole/part, or otherwise disclosed, without prior
ASP.NET MVC Secure Coding 4-Day hands on Course. Course Syllabus
ASP.NET MVC Secure Coding 4-Day hands on Course Course Syllabus Course description ASP.NET MVC Secure Coding 4-Day hands on Course Secure programming is the best defense against hackers. This multilayered
Web24 Web Hosting Guide
Web24 Web Hosting Guide Welcome Dear Web24 customer, We would like to thank you for choosing Web24 as your preferred web hosting provider. To make your experience as enjoyable as possible, we have prepared
Reversing Android Malware
Reversing Android Malware The Honeynet Project 10 th Annual Workshop ESIEA PARIS.FR 2011-03-21 MAHMUD AB RAHMAN (MyCERT, CyberSecurity Malaysia) Copyright 2011 CyberSecurity Malaysia MYSELF Mahmud Ab Rahman
Software Reversing Engineering (a.k.a. Reversing) Spiros Mancoridis. What is Reverse Engineering? Software Reverse Engineering: Reversing
Software Reversing Engineering (a.k.a. Reversing) Spiros Mancoridis What is Reverse Engineering? Reverse engineering (RE) is the process of etracting the knowledge or design blueprints from anything man
FORBIDDEN - Ethical Hacking Workshop Duration
Workshop Course Module FORBIDDEN - Ethical Hacking Workshop Duration Lecture and Demonstration : 15 Hours Security Challenge : 01 Hours Introduction Security can't be guaranteed. As Clint Eastwood once
