White paper: August Marcin Icewall Noga
|
|
|
- Nickolas Ball
- 10 years ago
- Views:
Transcription
1 White paper: GetCodec Multimedia Trojan Analysis August 2008 Marcin Icewall Noga
2 1. Introduction Recently a new trojan was spotted spreading in the wild, infecting multi-media files on end-user PCs with malicious content. The interesting detail about the malware is that its code embedding functionality is based on the ASF (Advanced Systems Format) format. ASF is Microsoft's proprietary digital audio/digital video container format, especially meant for streaming media. ASF is part of the Windows Media framework. The format does not specify how (i.e. with which codec) the video or audio should be encoded; it just specifies the structure of the video/audio stream. This is similar to the function performed by the QuickTime, AVI, or Ogg container formats. One of the objectives of ASF was to support playback from digital media servers, HTTP servers, and local storage devices such as hard disk drives. The most common file types contained within an ASF file are Windows Media Audio (WMA) and Windows Media Video (WMV). Note that the file extension abbreviations are different from the codecs which have the same name. Files containing only WMA audio can be named using a.wma extension, and files of audio and video content may have the extension.wmv. Both may use the.asf extension if desired. The following VirusTotal excerpt illustrates the signatures given by the different Antivirus vendors to a sample belonging to this family: AntiVir Avast AVG BitDefender QuickHeal esafe F-Secure Fortinet GData Ikarus Kaspersky McAfee NOD32v2 Panda Prevx1 Sophos Sunbelt Symantec TheHacker TrendMicro VBA32 VirusBuster Webwasher Worm/GetCodec.A Win32:Trojan-gen {Other} Downloader.Generic7.YJK Trojan.Downloader.GetCodec.B Worm.GetCodec.a Suspicious File Worm.Win32.GetCodec.a PossibleThreat Worm.Win32.GetCodec.a Worm.Win32.GetCodec.a Worm.Win32.GetCodec.a W32/GetCodec.a Win32/TrojanDownloader.Small.OCY Suspicious file Cloaked Malware W32/GetCodec-A Worm.Win32.GetCodec.a Trojan.Brisv.A W32/GetCodec.a PAK_Generic.001 Worm.Win32.GetCodec.a Worm.GetCodec.A Win32.Trojan.ASF.Hijacker.A There seems to be a certain degree of agreement in calling the family GetCodec, after a full reverse engineering analysis of the sample this paper will probably justify this name. 2
3 2. Introduction This section pretends to provide a reverse engineering analysis of the key elements of the sample that produced the previous VirusTotal report, more specifically the sample is identified by the following hashes: MD5: 4e2f538fa4dfe028c221ee7f020a05d4 SHA1: 3a2055b22105b8de4b384d7a1936afaafd7df8c1 This sample is packed with PECompact 2.x -> Jeremy Collake, unpacking reveals that it was coded in C++ and compiled using Microsoft Visual Studio. Let us take a look at the main routine: Figure 1 - Main malware routine The disassembly also reveals certain class variables: countofscanedentities 10h 0 malware_installed 14h 1 (first malware execution 0) countofscanedfiles 18h 0 countofinfectedfiles 1Ch 0 hundretofscanedfiles 20h 0 prot_data 24h addr tempfilepath 28h addr (TempPath) thread_priority 2Ch 0 3
4 As we can see in Figure 1, after a successful COM library initialization the Trojan tries to execute the following routines: Initialization_and_BasicCheck Set_Mutex Modify_Winamp_Conf Modify_WMP_Conf Search_and_Infection_Mechanism The next subsections will try to bring some light into these routines in order to understand what is the process followed in corrupting the victim machine Initialization_and_BasicCheck routine The trojan uses this function to initialize class variables and check whether it was executed in the past. In order to perform this check the following registry key is opened: HKEY_CURRENT_USER\SOFTWARE\Microsoft\PIMSRV And there is an attempt to read from the registry value prot. Figure 2 - Check to see whether the trojan was previously executed 4
5 Whenever this procedure fails, the ismalwareinstalled routine returns false and the malware_installed variable is set to 0:.text:004011E9 call ismalwareinstalled.text:004011ee movzx ecx, al.text:004011f1 test ecx, ecx.text:004011f3 jnz short malware_was_executed.text:004011f5 mov edx, [ebp+this].text:004011f8 mov [edx+malware_installed], 0 ; set_to_false After this, the trojan tries to initialize the temppath variable making use of the GetTempPathW Windows API function, if this fails it is initialized to C:\\..text:004011FC push 5000h ; dwbytes.text: call operator new(uint).text: add esp, 4.text: mov [ebp+aloc_heap2], eax.text: c mov eax, [ebp+this].text: f mov ecx, [ebp+aloc_heap2].text: mov [eax+temppath], ecx.text: mov edx, [ebp+this].text: mov eax, [edx+temppath].text: b push eax ; lpbuffer.text: c push ; nbufferlength.text: call GetTempPathW.text: mov [ebp+length_of_copied_buffer], eax.text: a cmp [ebp+length_of_copied_buffer], text: ja short loc_ text: cmp [ebp+length_of_copied_buffer], 0.text: jnz short loc_40124b.text: text: loc_401239:.text: push offset C_root ; "C:\\".text: E mov ecx, [ebp+this].text: mov edx, [ecx+temppath].text: push edx ; lpstring1.text: call lstrcpyw 2.2. Set_Mutex routine The trojan uses this function to control its own instance count, this is done making use of a mutex that ensures that only one instance is running: Set_Mutex proc near var_4= dword ptr -4 push ebp mov ebp, esp push ecx mov [ebp+var_4], ecx push offset Name ; "PIMSRV1" push 1 ; binitialowner push 0 ; lpmutexattributes call CreateMutexW call GetLastError sub eax, 0B7h neg eax 5
6 sbb eax, eax inc eax mov esp, ebp pop ebp retn Set_Mutex endp 2.3. Modify_Winamp_Conf routine After this, the trojan will attempt to modify Winamp s configuration file. Figure 3 - Modify_Winamp_Conf routine 6
7 As we can see in Figure 3 the trojan is using the SHGetFolderPathW Windows API in order to get two paths belonging to Winamp s configuration via CSIDL 1. The CSIDL value is calculated in the following code excerpt:.text:004026ec mov edx, [ebp+counter].text:004026f2 mov eax, [ebp+edx*4+csidl] This counter moves in the range 0-7. The first two elements in the CSIDLs_table are then initialized to 1Ah and 1Ch..text:004026AF mov [ebp+csidl], 1Ah.text:004026B6 mov [ebp+csidl2], 1Ch Two constants are declared with these values in Shfolder.h: CSIDL_APPDATA 0x001a // Application Data, new for NT4 CSIDL_LOCAL_APPDATA 0x001c // non roaming, user\local Settings\Application Data This enables the trojan to modify Winamp s configuration file: "C:\Documents and Settings\USERNAME\Application Data\Winamp\winamp.ini" // CSIDL_APPDATA "C:\Documents and Settings\USERNAME\Local Settings\Application Data\Winamp\winamp.ini" // CSIDL_LOCAL_APPDATA It specifically attempts to modify the following settings: defext: This setting defines what is the default extension when Winamp is asked to play a file with an unknown extension. By default this parameter is set to MP3. extlist_aac: No info was found regarding this property. Figure 4 - Modified Winamp configuration file 1 CSIDL (constant special item ID list) values provide a unique system-independent way to identify special folders used frequently by applications, but which may not have the same name or location on any given system. For example, the system folder may be "C:\Windows" on one system and "C:\Winnt" on another. These constants are defined in Shlobj.h. A subset of them is also defined in Shfolder.h. 7
8 As you can notice, the malware author only declared two values in the CSIDLs_table, what happens with the rest? We said that the author defines a counter that sweeps the range 0-7, the values 2-7 will just retrieve random values from the stack (perhaps it was a coding error) Modify_WMP_Conf routine The next target of the sample is Windows Media Player s preferences. It creates the registry key: HKCU\Software\Microsoft\MediaPlayer\Player\Extensions\.mp3 And sets the value "Permissions" to 31. This is the bitwise OR of all the available options for this value. In other words, this modification sets permissions for playback, folder drop, media CD, library, HTML streaming and transcoding. Consecutively, the URLAndExitCommandsEnabled Windows Media Player setting is changed. When a content owner creates an audio or a video stream, that content owner can add script commands (such as URL script commands and custom script commands) that are embedded in the stream. When the stream is played back, the script commands can trigger events in an embedded player program, or they can start your Web browser and then connect to a particular Web page. This behaviour is by design. The property modified by the malware is responsible for turning off/on URLAndExit script commands in ASF files, it defaults to 1 (on), which means that the functionality is enabled even if the registry value URLAndExitCommandsEnabled does not exist. Taking a further look at the code:.text:004025b0 modify_wmp_conf proc near.text:004025b0.text:004025b0 var_18 = dword ptr -18h.text:004025B0 var_14 = dword ptr -14h.text:004025B0 var_d = byte ptr -0Dh.text:004025B0 dwdisposition = dword ptr -0Ch.text:004025B0 hkey = dword ptr -8.text:004025B0 Data = byte ptr -4.text:004025B0.text:004025B0 push ebp.text:004025b1 mov ebp, esp.text:004025b3 sub esp, 18h.text:004025B6 mov [ebp+var_14], ecx.text:004025b9 mov [ebp+hkey], 0.text:004025C0 mov dword ptr [ebp+data], 0.text:004025C7 mov [ebp+var_d], 0.text:004025CB lea eax, [ebp+hkey].text:004025ce push eax ; phkresult.text:004025cf push 2001Fh ; samdesired.text:004025d4 push 0 ; uloptions.text:004025d6 push offset SubKey ; "Software\\Microsoft\\MediaPlayer\\Preferen"....text:004025DB push HKEY_CURRENT_USER ; hkey.text:004025e0 call RegOpenKeyExW.text:004025E6 test eax, eax.text:004025e8 jnz short loc_40260b.text:004025ea push 4 ; cbdata.text:004025ec lea ecx, [ebp+data] 8
9 .text:004025ef push ecx ; lpdata.text:004025f0 push 4 ; dwtype.text:004025f2 push 0 ; Reserved.text:004025F4 push offset ValueName ; "URLAndExitCommandsEnabled".text:004025F9 mov edx, [ebp+hkey].text:004025fc push edx ; hkey.text:004025fd call RegSetValueExW We notice that very surprisingly the malware author sets the value of URLAndExitCommandsEnabled to 0. Indeed, he just turned off URLAndExit script commands in ASF files, disabling the sample from downloading any other trojan making use of this method. Some people may think that this was done due to a misinterpretation of the documentation, others might say it is probably a coding error, the author of this paper personally believes that it was done on purpose. This approach makes the attack stealthier, hence it may be used as a trick to hide the attack from the victim. If this had not been done the victim would notice that after executing the trojan many of his multimedia files display strange codec installation messages when opening them and he might be led to believe that the trojan caused this. We must take into account that this trojan is spreading through warez and crack pages, hence the victim would just think it is yet another corrupted crack Search_and_Infection_Mechanism routine This routine is the heart of the malware itself, it is responsible for the main malicious actions. First of all the trojan sets THREAD_PRIORITY_BELOW_NORMAL for its own thread and then launches a main routine which aims to search and infect files on the victim s hard drive:.text:004019c0 Search_and_Infect proc near.text:004019c0.text:004019c0.text:004019c0 push ebp.text:004019c1 mov ebp, esp.text:004019c3 sub esp, 250h.text:004019C9 mov [ebp+this], ecx.text:004019cf mov ecx, [ebp+this].text:004019d5 add ecx, 8.text:004019D8 call sub_ text:004019dd mov [ebp+csidl], 35h.text:004019E4 mov [ebp+csidl1], 37h.text:004019EB mov [ebp+csidl2], 0Dh.text:004019F2 mov [ebp+csidl3], 5.text:004019F9 mov [ebp+csidl4], 2Eh.text:00401A00 mov [ebp+csidl5], 1Ah.text:00401A07 mov [ebp+csidl6], 1Ch.text:00401A0E mov [ebp+csidl7], 6.text:00401A15 mov [ebp+csidl8], 10h.text:00401A1C mov [ebp+csidl9], 13h.text:00401A23 mov [ebp+csidl10], 3Bh.text:00401A2A mov [ebp+counter], 0.text:00401A34 jmp short loc_401a45.text:00401a36 ;
10 .text:00401a36.text:00401a36 loc_401a36:.text:00401a36 mov eax, [ebp+counter].text:00401a3c add eax, 1.text:00401A3F mov [ebp+counter], eax.text:00401a45.text:00401a45 loc_401a45:.text:00401a45 cmp [ebp+counter], 44.text:00401A4C jnb short loc_401a84.text:00401a4e lea ecx, [ebp+filename].text:00401a54 push ecx ; pszpath.text:00401a55 push 0 ; dwflags.text:00401a57 push 0 ; htoken.text:00401a59 mov edx, [ebp+counter].text:00401a5f mov eax, [ebp+edx*4+csidl] ;CSIDL_table.text:00401A63 push eax ; csidl.text:00401a64 push 0 ; hwnd.text:00401a66 call SHGetFolderPathW.text:00401A6C test eax, eax.text:00401a6e jl folder_path_not_available.text:00401a70 lea ecx, [ebp+filename].text:00401a76 push ecx ; Path.text:00401A77 mov ecx, [ebp+this].text:00401a7d call SearchVulnsFiles.text:00401A82.text:00401A82 folder_path_not_available:.text:00401a82 jmp short loc_401a36.text:00401a84 ; text:00401a84.text:00401a84 loc_401a84:.text:00401a84 mov ecx, [ebp+this].text:00401a8a call sub_401c00.text:00401a8f mov al, 1.text:00401A91 mov esp, ebp.text:00401a93 pop ebp.text:00401a94 retn.text:00401a94 Search_and_Infect endp Looking at the code we can figure out that the author made a new mistake. The counter in the loop wipes the values What this code really does is asking for 44 entries from CSIDL_table, however, only 11 are initialized. The paths returned by the call to SHGetFolderPathW are used as root paths in order to search for vulnerable files to infect (i.e. mp2, mp3, wma, wmv, asf). Using shlobj.h, we can check the CSIDL:.text:004019DD mov [ebp+csidl], 35h ;CSIDL_COMMON_MUSIC 0x0035 // All Users\My Music.text:004019E4 mov [ebp+csidl1], 37h ;CSIDL_COMMON_VIDEO 0x0037 // All Users\My Video.text:004019EB mov [ebp+csidl2], 0Dh ;CSIDL_MYMUSIC 0x000d // "My Music" folder.text:004019f2 mov [ebp+csidl3], 5 ;CSIDL_PERSONAL 0x0005 // My Documents.text:004019F9 mov [ebp+csidl4], 2Eh ; CSIDL_COMMON_DOCUMENTS 0x002e // All Users\Documents.text:00401A00 mov [ebp+csidl5], 1Ah ;CSIDL_APPDATA 0x001a // <user name>\application Data.text:00401A07 mov [ebp+csidl6], 1Ch ;CSIDL_LOCAL_APPDATA 10
11 0x001c // <user name>\local Settings\Applicaiton Data (non roaming).text:00401a0e mov [ebp+csidl7], 6 ;CSIDL_FAVORITES 0x0006 // <user name>\favorites.text:00401a15 mov [ebp+csidl8], 10h ;CSIDL_DESKTOPDIRECTORY 0x0010 // <user name>\desktop.text:00401a1c mov [ebp+csidl9], 13h ;CSIDL_NETHOOD 0x0013 // <user name>\nethood.text:00401a23 mov [ebp+csidl10], 3Bh ;CSIDL_CDBURN_AREA 0x003b // USERPROFILE\Local Settings\Application Data\Microsoft\CD Burning The most interesting path among these is: CSIDL_CDBURN_AREA 0x003b // USERPROFILE\Local Settings\Application Data\Microsoft\CD Burning Why is this so interesting? The CD Burning folder contains files which are ready to be burnt on a CD/DVD, hence, infecting these files allows the malware to propagate via CD/DVD sharing. So the first path where the malware searches for vulnerable files is //All Users\My Music. In our case this is: C:\Documents and Settings\All Users\Documents\My Music Let us leave two target files in this folder: Figure 5 - Files created as baits for the malware We have used two different file formats in order to discover differences in the malware s behaviour based on this parameter. File Searching In order to search for files to infect the malware author makes use of two good known Windows APIs: FindFirstFileW FindNextFileW 11
12 These APIs will return a WIN32_FIND_DATAW data structure representing a target search directory. A recursive search is then performed on these directories, with a maximum depth of 30 recursions:.text:004013f9 mov [ebp+this], ecx.text:004013ff mov eax, [ebp+recursivecounter].text: mov ecx, [ebp+recursivecounter] ; default 0.text: add ecx, 1.text: mov [ebp+recursivecounter], ecx.text: b cmp eax, 30.text: E jle short continue_searching.text: xor al, al ; set return value to false.text: jmp endofsearchfile Notice from the following code that the LPCTSTR lpfilename argument for FindFirstFileW is the path returned by SHGetFolderPathW plus the wildcard \* :.text:004014e2 mov ecx, [ebp+pathcopy2].text:004014e5 movzx edx, word ptr [ecx+eax*2-2].text:004014ea cmp edx, '\'.text:004014ed jz short loc_4014fe.text:004014ef push offset back_slash ; lpstring2.text:004014f4 mov eax, [ebp+pathcopy2].text:004014f7 push eax ; lpstring1.text:004014f8 call lstrcatw.text:004014fe.text:004014fe loc_4014fe:.text:004014fe push offset asterix ; lpstring2.text: mov ecx, [ebp+pathcopy2].text: push ecx ; lpstring1.text: call lstrcatw.text: d lea edx, [ebp+wfd].text: push edx ; lpfindfiledata.text: mov eax, [ebp+pathcopy2].text: push eax ; lpfilename.text: call FindFirstFileW So after this whole process you may be thinking, what if I store my multimedia files in a location that is not present among the CSIDL paths? Since searching is performed on particular CSIDL paths my files should be safe from code injection, correct? Bad luck, before ending the Search_and_Infect loop the sample calls Search_files_on_LogicalDrives. As you can see in Figure 6, the sample will try to infect files on all drives which are of type: DRIVE_FIXED: fixed media (e.g. hard drives or flash drives). DRIVE_REMOTE: remote network drives. So whatever the case the trojan will always try to find interesting files to infect, even if they are on a pendrive or shared folder. This makes it ideal for propagating in corporate environments and organizations with intensive use of shares: schools, residences, etc. 12
13 Figure 6 - Search_files_on_LogicalDrives disassembly Moving on we can see that if the sample is being run for the first time malware_installed will be set to false and the count of scanned entities (files and folders) will be 0 mod 100, for each multiple of 100 the sample will save its current path in the registry:.text: mov eax, [ebp+this].text: b movzx ecx, [eax+malware_installed] ; on first malware execution 0.text: F test ecx, ecx.text: jnz short malware_was_executed.text: mov edx, [ebp+this].text: mov eax, [edx+countofscanedentities] ; default 0.text: C cdq.text: d mov ecx, 100.text:004015A2 idiv ecx.text:004015a4 mov eax, [ebp+this].text:004015aa mov ecx, [eax+countofscanedentities].text:004015ad add ecx, 1.text:004015B0 mov eax, [ebp+this].text:004015b6 mov [eax+countofscanedentities], ecx.text:004015b9 test edx, edx 13
14 .text:004015bb jnz short malware_was_executed.text:004015bd mov ecx, [ebp+currentpath].text:004015c3 push ecx ; lpdata.text:004015c4 mov ecx, [ebp+this].text:004015ca call set_prot_path ; set current 'path' to prot value.text:004015cf malware_was_executed: When this is the case (it is the first execution), the current path will be set as the value of: HKEY_CURRENT_USER\SOFTWARE\Microsoft\PIMSRV\prot Figure 7 - Registry change upon first execution On the other hand, when malware_installed is set to true (the sample is being run for the second time), the sample will check whether its path is equal to the one saved in this registry key:.text:004015cf malware_was_executed:.text:004015cf mov edx, [ebp+this].text:004015d5 movzx eax, [edx+malware_installed].text:004015d9 test eax, eax.text:004015db jz short loc_ text:004015dd mov ecx, [ebp+currentpath].text:004015e3 push ecx ; lpstring.text:004015e4 mov edx, [ebp+this].text:004015ea mov eax, [edx+prot_data].text:004015ed push eax.text:004015ee mov ecx, [ebp+this].text:004015f4 call Cmp_Path_protData.text:004015F9 movzx ecx, al.text:004015fc test ecx, ecx.text:004015fe jz search_next_file If both paths match then the malware_installed variable is set to 0 and the execution flow is redirected to FindNextFileW. This call will return a new entity if something is found, this entity must be checked in order to see whether it is a file or directory: 14
15 Figure 8 File searching When the entity found is a directory the recursive search already mentioned will be launched. If however, the entity is a file, the trojan will check its extension to see if it is a target. In our case the first file found is the bait: Beethoven's Symphony No. 9 (Scherzo).wma Its file extension is compared with the entries from two tables: Figure 9 - Deciding whether a file is a target or not 15
16 One of these tables contains the extensions of mpx files, while the other one includes those related with Windows Media Player. Whenever the file found is of its interest the malware jumps to the FileIsVulnerable block:.text: mov edx, [ebp+currentpath].text: a push edx ; VulFilePath.text: B mov ecx, [ebp+this].text: call TryInfect As you can see, this will try to infect the file. Infection methodology The TryInfect routine starts off by creating a temporary file:.text:00401cef push offset PrefixString ; "NEW".text:00401CF4 mov ecx, [ebp+this].text:00401cfa mov edx, [ecx+28h].text:00401cfd push edx ; lppathname.text:00401cfe call GetTempFileNameW This temporary file is located in the %temp% folder (usually C:\DOCUME~1\virtual\LOCALS~1\Temp) with NEW as its file name prefix: C:\DOCUME~1\virtual\LOCALS~1\Temp\NEW21.tmp After this, the malware sample will check whether if the target file to infect has the FILE_ATTRIBUTE_READONLY attribute set:.text:00401d0f mov eax, [ebp+vulfilepath].text:00401d12 push eax ; lpfilename.text:00401d13 lea ecx, [ebp+var_5034].text:00401d19 call isreadonly Whenever this attribute is set it is unset using an XOR operation: FILE_ATTRIBUTE xor FILE_ATTRIBUTE_READONLY Once the file attributes have been updated it goes on to the actual code injection:.text:00401d40 mov byte ptr [ebp+var_4], 1.text:00401D44 mov [ebp+lpmode], 0.text:00401D4B lea eax, [ebp+lpmode].text:00401d51 push eax.text:00401d52 lea ecx, [ebp+tempfilepath].text:00401d58 push ecx.text:00401d59 mov edx, [ebp+vulfilepath].text:00401d5c push edx.text:00401d5d mov eax, [ebp+this].text:00401d63 mov edx, [eax].text:00401d65 mov ecx, [ebp+this].text:00401d6b call dword ptr [edx] ; Main_injection_routine All the variables set for the code injection routine should be relatively clear, let us dig into the code: 16
17 Figure 10 - File extension check As you can see, this routine checks VulnFileExtension only in one table: mpx_table. Any extensions not indexed in it will tell the malware that it is dealing with a WMP file. What is the point of grouping files according to two extensions? Does the sample deal differently with them? A quick glance reveals two different infection routines: Convert_infect_mpX_file Infect_wmp_file Examination of these routines enables us to conclude that the direct infection method is exactly the same, the difference lies in the fact that mpx files must be first converted to.asf format. 17
18 Figure 11 - Conversion to ASF file format The conversion is done making use of COM interfaces. This conversion also explains the fact that convert_infect_mpx_file accepts an additional argument called TempFilePath. This argument is a pointer to the temporary file previously created, which will be used to convert the.mpx file to.asf. If we recall the two files we created for this test, VulnFilePath will still be pointing to: C:\Documents and Settings\All Users\Documents\My Music\Beethoven's Symphony No. 9 (Scherzo).wma Given the extension, infect_wmp_file will be executed. Let us follow its disassembly: 18
19 Figure 12 - infect_wmp_file routine So as to see whether a file is infected the author tries to get the COM interfaces IWMHeaderInfo or IWMHeaderInfo3 with the GetInterface function. These COMs allow the trojan to read information from ASF files:.text:00402ec4 push 0 ; int.text:00402ec6 lea eax, [ebp+lpvar].text:00402ec9 push eax ; int.text:00402eca lea ecx, [ebp+ppeditor].text:00402ecd push ecx ; ppeditor.text:00402ece mov edx, [ebp+vulnfilepath].text:00402ed1 push edx ; lppath.text:00402ed2 call GetInterface The trojan then sets a counter of scripts:.text:00402f07 mov [ebp+var_48], 0.text:00402F0E mov [ebp+var_44], 0.text:00402F15 mov [ebp+countofscripts], 0.text:00402F1B lea edx, [ebp+countofscripts].text:00402f1e push edx.text:00402f1f mov eax, [ebp+lpvar].text:00402f22 push eax.text:00402f23 mov ecx, [ebp+lpvar].text:00402f26 mov edx, [ecx].text:00402f28 call dword ptr [edx+2ch] ; IWMHeaderInfo::GetScriptCount.text:00402F2B mov [ebp+var_106c], eax.text:00402f31 mov eax, [ebp+var_106c].text:00402f37 mov [ebp+var_34], eax.text:00402f3a mov [ebp+counter], 0.text:00402F41 jmp short loc_402f4c 19
20 .text:00402f43 ; text:00402f43.text:00402f43 loc_402f43:.text:00402f43 mov ecx, [ebp+counter].text:00402f46 add ecx, 1.text:00402F49 mov [ebp+counter], ecx.text:00402f4c.text:00402f4c loc_402f4c:.text:00402f4c movzx edx, [ebp+countofscripts].text:00402f50 cmp [ebp+counter], edx.text:00402f53 jge no_more_scripts_available The counters allow the trojan to traverse all the scripts in the file header:.text:00402f59 mov [ebp+pcchtypelen], 1024.text:00402F62 mov [ebp+pcchcommandlen], 1024.text:00402F6B lea eax, [ebp+pcnsscripttime].text:00402f6e push eax.text:00402f6f lea ecx, [ebp+pcchcommandlen].text:00402f75 push ecx.text:00402f76 lea edx, [ebp+pwszcommand].text:00402f7c push edx.text:00402f7d lea eax, [ebp+pcchtypelen].text:00402f83 push eax.text:00402f84 lea ecx, [ebp+pwsztype].text:00402f8a push ecx.text:00402f8b mov dx, word ptr [ebp+counter] ; windex.text:00402f8f push edx.text:00402f90 mov eax, [ebp+lpvar].text:00402f93 push eax.text:00402f94 mov ecx, [ebp+lpvar].text:00402f97 mov edx, [ecx].text:00402f99 call dword ptr [edx+30h];iwmheaderinfo::getscript.text:00402f9c mov [ebp+var_1070], eax.text:00402fa2 mov eax, [ebp+var_1070].text:00402fa8 mov [ebp+hresult], eax.text:00402fab cmp [ebp+hresult], S_OK.text:00402FAF jge short successfull_readed.text:00402fb1 mov [ebp+var_105f], 0.text:00402FB8 push offset dword_40e568.text:00402fbd lea ecx, [ebp+var_105f].text:00402fc3 push ecx.text:00402fc4 call _CxxThrowException(x,x) A match between CommandLen and Type is the flag condition for the target file being already infected, if this happens the return value of isinfected will be true and no further actions will be taken. If however, the file was not infected the execution flow will jump to the infection routine: 20
21 Figure 13 - Infection routine As we can see the infection mechanism adds a URLANDEXIT script to the file requesting the resource The AddScript_URLANDEXIT_ procedure simply takes the IWMHeaderInfoX interface on VulnFile and then executes IWMHeaderInfo::AddScript so as to inject the malicious code: Figure 14 - AddScript_URLANDEXIT_ 21
22 Indeed, if we take a look at the size of the infected file and the non-infected file we get a hint about the routine s success: A quick glance with a hex editor confirms the infection: Figure 15 - Hex stream after infection The lpmode variable is strictly related to the type of file which was infected, it is most useful when the infected file is a.mpx. Figure 16 - lpmode variable 22
23 The file that was converted from.mpx to.asf was stored in %temp%. Since the infection is only performed on TEMPFILE the malware must replace the original.mpx with the new file packed into ASF:.text:00401DB6 push REPLACE_EXISTING_COPY_ALLOWED ; dwflags.text:00401db8 mov ecx, [ebp+vulfilepath].text:00401dbb push ecx ; lpnewfilename.text:00401db lea edx, [ebp+tempfilepath].text:00401dc2 push edx ; lpexistingfilename.text:00401dc3 call MoveFileExW Here is where the infection process ends. 23
24 3. Testing infected files The reverse engineering analysis revealed that the sample disables URLAndExitComandsEnables once it is executed, hence, if we want to test the newly infected files we must turn on this functionality (URLAndExitCommandsEnabled = 1). Trying to play the music file makes it clear that it was infected: Figure 17 - Execution of an infected file We saw that the actual request which was injected into the file was this site redirects to this is why the From field in the dialog box contains this value. Therefore, as soon as the infected multimedia file is played a pop-up requesting the installation of a fake codec is displayed, this fake codec is yet another malware sample. 24
25 4. Conclusion As we have seen, this is yet another technique being used by malware authors to fool users into downloading malicious files. It is a method that can be used to deliver any type of content by simply changing the URL for the codec download. This is a very neat approach since the file to be delivered can be easily changed on the server side, making it possible to place updates as the Antivirus industries improve their signatures. Additionally, the author of this particular sample has taken a clever decision when redirecting the URL of the fake codec to another location that really stores the malicious file to deliver. In this way, if the site serving the file is ever shut down he can simply change the redirection to another server with the sample. This increases the average time in taking down the infrastructure of the trojan, which probably improves his return on investment. Given the nature of the targeted files, it is an ideal means for propagating through P2P networks. Any infected user will be serving infected multimedia files via his shares. Probably peers requesting movies, clips, etc. from the infected user will not be suspicious once they check that indeed the downloaded file is a multimedia file and will probably end up infected themselves. Network shares in corporate environments, schools, residences, etc. are also an ideal means of propagation. This is yet another example of how the combination of technique and social engineering is a nice cocktail when aiming at high propagation rates. In the end everything is about the end-user being properly educated, making him aware of the new threats and about the fact that media files can indeed be of a malicious nature. Back from Hispasec we hope that this paper helps in building awareness and we hope that the tool developed by the author in order to clean the infection is useful. 25
Software Fingerprinting for Automated Malicious Code Analysis
Software Fingerprinting for Automated Malicious Code Analysis Philippe Charland Mission Critical Cyber Security Section October 25, 2012 Terms of Release: This document is approved for release to Defence
Abysssec Research. 1) Advisory information. 2) Vulnerable version
Abysssec Research 1) Advisory information Title Version Discovery Vendor Impact Contact Twitter CVE : Apple QuickTime FlashPix NumberOfTiles Remote Code Execution Vulnerability : QuickTime player 7.6.5
TitanMist: Your First Step to Reversing Nirvana TitanMist. mist.reversinglabs.com
TitanMist: Your First Step to Reversing Nirvana TitanMist mist.reversinglabs.com Contents Introduction to TitanEngine.. 3 Introduction to TitanMist 4 Creating an unpacker for TitanMist.. 5 References and
Online Payments Threats
July 3, 2012 Introduction...2 Tested Products...2 Used Configuration...3 Real Malware Inspiration...3 Total Scores Chart...4 Conclusion...4 About matousec.com...4 Detailed Descriptions of Tests...5 Detailed
INTRODUCTION TO MALWARE & MALWARE ANALYSIS
INTRODUCTION TO MALWARE & MALWARE ANALYSIS by Quick Heal R&D lab Security Simplified INTRODUCTION Very often people call everything that corrupts their system a virus without being aware about what it
This report is a detailed analysis of the dropper and the payload of the HIMAN malware.
PAGE 5 Check Point Malware Research Group HIMAN Malware Analysis December 12, 2013 Researcher: Overview This report is a detailed analysis of the dropper and the payload of the HIMAN malware. This malware
Reversing C++ Paul Vincent Sabanal. Mark Vincent Yason
As recent as a couple of years ago, reverse engineers can get by with just knowledge of C and assembly to reverse most applications. Now, due to the increasing use of C++ in malware as well as most moderns
esrever gnireenigne tfosorcim seiranib
esrever gnireenigne tfosorcim seiranib Alexander Sotirov [email protected] CanSecWest / core06 Reverse Engineering Microsoft Binaries Alexander Sotirov [email protected] CanSecWest / core06 Overview
Introduction to Reverse Engineering
Introduction to Reverse Engineering Inbar Raz Malware Research Lab Manager December 2011 What is Reverse Engineering? Reverse engineering is the process of discovering the technological principles of a
1. General function and functionality of the malware
1. General function and functionality of the malware The malware executes in a command shell, it begins by checking to see if the executing file contains the MZP file extension, and then continues to access
How To Hack The Steam Voip On Pc Orchesterian Moonstone 2.5 (Windows) On Pc/Robert Kruber (Windows 2) On Linux 2.2.2 (Windows 3.5) On A Pc
ReVuln Ltd. http://revuln.com @revuln [email protected] Revision 3 STEAM VOIP SECURITY BY LUIGI AURIEMMA Overview and details about the security issues found in the Steam voice framework. TABLE OF CONTENTS
McAfee Labs Threat Advisory W32/Autorun.worm.aaeb-h
Summary McAfee Labs Threat Advisory W32/Autorun.worm.aaeb-h August 9, 2013 W32/Autorun.worm.aaeb-h has the ability to infect removable media devices, as well as mounted network shares. Infection starts
From Georgia, with Love Win32/Georbot. Is someone trying to spy on Georgians?
From Georgia, with Love Win32/Georbot Is someone trying to spy on Georgians? At the beginning of the year, a curious piece of malware came to our attention. An analyst in our virus laboratory noticed that
CS412/CS413. Introduction to Compilers Tim Teitelbaum. Lecture 20: Stack Frames 7 March 08
CS412/CS413 Introduction to Compilers Tim Teitelbaum Lecture 20: Stack Frames 7 March 08 CS 412/413 Spring 2008 Introduction to Compilers 1 Where We Are Source code if (b == 0) a = b; Low-level IR code
Hacking Techniques & Intrusion Detection. Ali Al-Shemery arabnix [at] gmail
Hacking Techniques & Intrusion Detection Ali Al-Shemery arabnix [at] gmail All materials is licensed under a Creative Commons Share Alike license http://creativecommonsorg/licenses/by-sa/30/ # whoami Ali
Mariposa Botnet Analysis
Mariposa Botnet Analysis Defence Intelligence Thursday October 8th, 2009 (updated February 2010) DefenceIntelligence. 1 Matt Thompson 1. Mariposa Overview Defence Intelligence first observed Mariposa in
Forensic Analysis of Internet Explorer Activity Files
Forensic Analysis of Internet Explorer Activity Files by Keith J. Jones [email protected] 3/19/03 Table of Contents 1. Introduction 4 2. The Index.dat File Header 6 3. The HASH Table 10 4. The
Contact details For contacting ENISA or for general enquiries on information security awareness matters, please use the following details:
Malicious software About ENISA The European Network and Information Security Agency (ENISA) is an EU agency created to advance the functioning of the internal market. ENISA is a centre of excellence for
Fighting malware on your own
Fighting malware on your own Vitaliy Kamlyuk Senior Virus Analyst Kaspersky Lab [email protected] Why fight malware on your own? 5 reasons: 1. Touch 100% of protection yourself 2. Be prepared
Analysis of Win32.Scream
Analysis of Win32.Scream 1. Introduction Scream is a very interesting virus as it combines a lot of techniques written inside of it. In this paper I ll cover all of its features and internals. I ll dissect
McAfee Labs Combating Fake Alert infections. - Amith Prakash, Global Threat Response
McAfee Labs Combating Fake Alert infections - Amith Prakash, Global Threat Response 1 What are FakeAlerts?... 2 Symptoms... 2 Characteristics- CLASSICAL EXAMPLE OF SOCIAL ENGINEERING... 3 Warnings displayed
Windows XP SP3 Registry Handling Buffer Overflow
Windows XP SP3 Registry Handling Buffer Overflow by Matthew j00ru Jurczyk and Gynvael Coldwind Hispasec 1. Basic Information Name Windows XP SP3 Registry Handling Buffer Overflow Class Design Error Impact
Comprehensive Malware Detection with SecurityCenter Continuous View and Nessus. February 3, 2015 (Revision 4)
Comprehensive Malware Detection with SecurityCenter Continuous View and Nessus February 3, 2015 (Revision 4) Table of Contents Overview... 3 Malware, Botnet Detection, and Anti-Virus Auditing... 3 Malware
Inside a killer IMBot. Wei Ming Khoo University of Cambridge 19 Nov 2010
Do you? or Inside a killer IMBot Wei Ming Khoo University of Cambridge 19 Nov 2010 Background Tracking a botnet propagating over Skype & Yahoo IM. Bait is Foto Exploits social connectivity (friend
Avira Server Security. HowTo
Avira Server Security HowTo Table of Contents 1. Setup Modes... 3 1.1. Complete...3 1.2 Custom...3 2. Configuration... 8 2.1 Update configuration for the Avira Update Manager...8 2.2 Configuration of product
Return-oriented programming without returns
Faculty of Computer Science Institute for System Architecture, Operating Systems Group Return-oriented programming without urns S. Checkoway, L. Davi, A. Dmitrienko, A. Sadeghi, H. Shacham, M. Winandy
Anti-Virus Comparative
Anti-Virus Comparative Performance Test (Suite Products) Impact of Internet Security Software on System Performance Language: English October 2013 Last Revision: 19 th November 2013 Table of Contents 1.
CVE-2012-1535 Adobe Flash Player Integer Overflow Vulnerability Analysis
Your texte here. CVE-2012-1535 Adobe Flash Player Integer Overflow Vulnerability Analysis October 11 th, 2012 Brian MARIANI & Frédéric BOURLA A FEW WORDS ABOUT FLASH PLAYER Your Adobe texte Flash here
INTERNET & COMPUTER SECURITY March 20, 2010. Scoville Library. [email protected]
INTERNET & COMPUTER SECURITY March 20, 2010 Scoville Library [email protected] Internet: Computer Password strength Phishing Malware Email scams Identity Theft Viruses Windows updates Browser updates Backup
AJAX Storage: A Look at Flash Cookies and Internet Explorer Persistence
AJAX Storage: A Look at Flash Cookies and Internet Explorer Persistence Corey Benninger The AJAX Storage Dilemna AJAX (Asynchronous JavaScript and XML) applications are constantly looking for ways to increase
Anti-Virus Comparative - Performance Test (AV Products) May 2014
Anti-Virus Comparative Performance Test (AV Products) Impact of Anti-Virus Software on System Performance Language: English May 2014 Last Revision: 10 th June 2014 Table of Contents 1. Introduction 3 2.
REpsych. : psycholigical warfare in reverse engineering. def con 2015 // domas
REpsych : psycholigical warfare in reverse engineering { def con 2015 // domas Warning This serves no purpose Taking something apart to figure out how it works With software Interfacing Documentation Obsolescence
What do a banking Trojan, Chrome and a government mail server have in common? Analysis of a piece of Brazilian malware
What do a banking Trojan, Chrome and a government mail server have in common? Analysis of a piece of Brazilian malware Contents Introduction.................................2 Installation: Social engineering
A Tiny Guide to Programming in 32-bit x86 Assembly Language
CS308, Spring 1999 A Tiny Guide to Programming in 32-bit x86 Assembly Language by Adam Ferrari, [email protected] (with changes by Alan Batson, [email protected] and Mike Lack, [email protected])
CS61: Systems Programing and Machine Organization
CS61: Systems Programing and Machine Organization Fall 2009 Section Notes for Week 2 (September 14 th - 18 th ) Topics to be covered: I. Binary Basics II. Signed Numbers III. Architecture Overview IV.
Computer Viruses: How to Avoid Infection
Viruses From viruses to worms to Trojan Horses, the catchall term virus describes a threat that's been around almost as long as computers. These rogue programs exist for the simple reason to cause you
Anti-Virus Evasion Techniques and Countermeasures
Anti-Virus Evasion Techniques and Countermeasures Author: Debasis Mohanty www.hackingspirits.com Email ID: [email protected] [email protected] Table of Contents 1. INTRODUCTION............3 2.
Sophos Computer Security Scan startup guide
Sophos Computer Security Scan startup guide Product version: 1.0 Document date: February 2010 Contents 1 About the software...3 2 What do I need to do?...3 3 Prepare for scanning...3 4 Install the software...4
Static detection of C++ vtable escape vulnerabilities in binary code
Static detection of C++ vtable escape vulnerabilities in binary code David Dewey Jonathon Giffin School of Computer Science, Georgia Institute of Technology {ddewey, giffin}@gatech.edu Abstract Static
Application Whitelisting - Extend your Security Arsenal? Mike Baldi Cyber Security Architect Honeywell Process Solutions
Application Whitelisting - Extend your Security Arsenal? Mike Baldi Cyber Security Architect Honeywell Process Solutions 1 Agenda What is Application Whitelisting (AWL) Protection provided by Application
Kaspersky Whitelisting Database Test
Kaspersky Whitelisting Database Test A test commissioned by Kaspersky Lab and performed by AV-Test GmbH Date of the report: February 14 th, 2013, last update: April 4 th, 2013 Summary During November 2012
Software Vulnerabilities
Software Vulnerabilities -- stack overflow Code based security Code based security discusses typical vulnerabilities made by programmers that can be exploited by miscreants Implementing safe software in
Reverse Engineering and Computer Security
Reverse Engineering and Computer Security Alexander Sotirov [email protected] Introduction Security researcher at Determina, working on our LiveShield product Responsible for vulnerability analysis and
Host-based Intrusion Prevention System (HIPS)
Host-based Intrusion Prevention System (HIPS) White Paper Document Version ( esnhips 14.0.0.1) Creation Date: 6 th Feb, 2013 Host-based Intrusion Prevention System (HIPS) Few years back, it was relatively
Self Protection Techniques in Malware
DSIE 10 5 th Doctoral lsymposium on Informatics Engineering i January 28 29, 2010 Porto, Portugal Self Protection Techniques in Malware Tiago Santos Overview Introduction Malware Types Why Self Protection?
Introduction. Figure 1 Schema of DarunGrim2
Reversing Microsoft patches to reveal vulnerable code Harsimran Walia Computer Security Enthusiast 2011 Abstract The paper would try to reveal the vulnerable code for a particular disclosed vulnerability,
So today we shall continue our discussion on the search engines and web crawlers. (Refer Slide Time: 01:02)
Internet Technology Prof. Indranil Sengupta Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur Lecture No #39 Search Engines and Web Crawler :: Part 2 So today we
ANTIVIRUS BEST PRACTICES
ANTIVIRUS BEST PRACTICES Antivirus Best Practices 1. Introduction This guideline covers the basics on Antivirus Software and its best practices. It will help to have an overall understanding of the subject
CORPORATE AV / EPP COMPARATIVE ANALYSIS
CORPORATE AV / EPP COMPARATIVE ANALYSIS Exploit Evasion Defenses 2013 Randy Abrams, Dipti Ghimire, Joshua Smith Tested Vendors AVG, ESET, F- Secure, Kaspersky, McAfee, Microsoft, Norman, Panda, Sophos,
Release Notes for Websense Email Security v7.2
Release Notes for Websense Email Security v7.2 Websense Email Security version 7.2 is a feature release that includes support for Windows Server 2008 as well as support for Microsoft SQL Server 2008. Version
Hide and seek - how targeted attacks hide behind clean applications Szappanos Gábor
Hide and seek - how targeted attacks hide behind clean applications Szappanos Gábor Principal Malware Researcher 1 Honourable mentions: 2010. Stuxnet digitally signed drivers: stolen certificate June 2012.
WildFire Reporting. WildFire Administrator s Guide 55. Copyright 2007-2015 Palo Alto Networks
WildFire Reporting When malware is discovered on your network, it is important to take quick action to prevent spread of the malware to other systems. To ensure immediate alerts to malware discovered on
Efficient Program Exploration by Input Fuzzing
Efficient Program Exploration by Input Fuzzing towards a new approach in malcious code detection Guillaume Bonfante Jean-Yves Marion Ta Thanh Dinh Université de Lorraine CNRS - INRIA Nancy First Botnet
Best Practices for Deploying Behavior Monitoring and Device Control
Best Practices for Deploying Behavior Monitoring and Device Control 1 Contents Overview... 3 Behavior Monitoring Overview... 3 Malware Behavior Blocking... 3 Event Monitoring... 4 Enabling Behavior Monitoring...
WEB ATTACKS AND COUNTERMEASURES
WEB ATTACKS AND COUNTERMEASURES February 2008 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced in whole or in
Firewalls and Software Updates
Firewalls and Software Updates License This work by Z. Cliffe Schreuders at Leeds Metropolitan University is licensed under a Creative Commons Attribution-ShareAlike 3.0 Unported License. Contents General
Malicious Software. Ola Flygt Växjö University, Sweden http://w3.msi.vxu.se/users/ofl/ [email protected] +46 470 70 86 49. Viruses and Related Threats
Malicious Software Ola Flygt Växjö University, Sweden http://w3.msi.vxu.se/users/ofl/ [email protected] +46 470 70 86 49 1 Outline Viruses and Related Threats Malicious Programs The Nature of Viruses Antivirus
Braindumps.C2150-810.50 questions
Braindumps.C2150-810.50 questions Number: C2150-810 Passing Score: 800 Time Limit: 120 min File Version: 5.3 http://www.gratisexam.com/ -810 IBM Security AppScan Source Edition Implementation This is the
How to start with 3DHOP
How to start with 3DHOP Package content, local setup, online deployment http://3dhop.net 30/6/2015 The 3DHOP distribution Where to find it, what s inside The 3DHOP distribution package From the page http://3dhop.net/download.php
What you need to know to keep your computer safe on the Internet
What you need to know to keep your computer safe on the Internet Tip 1: Always install Operating System updates The most important steps for any computer user is to always install updates, especially security
An Insight into Cookie Security
An Insight into Cookie Security Today most websites and web based applications use cookies. Cookies are primarily used by the web server to track an authenticated user or other user specific details. This
Welcome to myihome! This is a step-by-step guide that will teach you on how to use myihome in the simplest way.
Welcome to myihome! This is a step-by-step guide that will teach you on how to use myihome in the simplest way. Syabas Technology Copyright (C) 2001-2006, All Right Reserved 1 Contents Introduction Introduction...
WildFire Overview. WildFire Administrator s Guide 1. Copyright 2007-2015 Palo Alto Networks
WildFire Overview WildFire provides detection and prevention of zero-day malware using a combination of malware sandboxing and signature-based detection and blocking of malware. WildFire extends the capabilities
TrusCont TM TSFD Protection Toolkit
TrusCont TM TSFD Protection Toolkit Version 2.4 User's Manual September 2011 2006-2011 TrusCont Ltd. Table of Contents 1. INTRODUCTION 8 1.1 TSFD KEY FEATURES 8 1.2 WHAT S NEW IN VERSION 2.4 8 1.3 WHAT
Automating Linux Malware Analysis Using Limon Sandbox Monnappa K A [email protected]
Automating Linux Malware Analysis Using Limon Sandbox Monnappa K A [email protected] A number of devices are running Linux due to its flexibility and open source nature. This has made Linux platform
Recommended Practice Case Study: Cross-Site Scripting. February 2007
Recommended Practice Case Study: Cross-Site Scripting February 2007 iii ACKNOWLEDGEMENT This document was developed for the U.S. Department of Homeland Security to provide guidance for control system cyber
Heap-based Buffer Overflow Vulnerability in Adobe Flash Player
Analysis of Zero-Day Exploit_Issue 03 Heap-based Buffer Overflow Vulnerability in Adobe Flash Player CVE-2014-0556 20 December 2014 Table of Content Overview... 3 1. CVE-2014-0556 Vulnerability... 3 2.
Deep Freeze Enterprise - Patch Management
Deep Freeze Enterprise - Patch Management TECHNICAL WHITEPAPER Last modified: June 26, 2009 Faronics Toll Free Tel: 800-943-6422 Toll Free Fax: 800-943-6488 International Tel: +1 604-637-3333 International
Countermeasures against Spyware
(2) Countermeasures against Spyware Are you sure your computer is not infected with Spyware? Information-technology Promotion Agency IT Security Center http://www.ipa.go.jp/security/ 1. What is a Spyware?
Spy Eye and Carberp the new banker trojans offensive
Spy Eye and Carberp the new banker trojans offensive The common way for a wanna-be hacker to fulfill his sick aspirations is to achieve a known trojan there is a plenty on the Internet, sometimes they
F-Secure Anti-Virus for Mac 2015
F-Secure Anti-Virus for Mac 2015 TOC F-Secure Anti-Virus for Mac 2015 Contents Chapter 1: Getting started...3 1.1 Manage subscription...4 1.2 How to make sure that my computer is protected...4 1.2.1 Protection
Abysssec Research. 1) Advisory information. 2) Vulnerable version
Abysssec Research 1) Advisory information Title Version Analysis Vendor Impact Contact Twitter CVE : Microsoft MPEG Layer- 3 Audio Stack Based Overflow : l3codeca.acm (XP SP2 XP SP3) : http://www.abysssec.com
(Self-Study) Identify How to Protect Your Network Against Viruses
SECTION 24 (Self-Study) Identify How to Protect Your Network Against Viruses The following objective will be tested: Describe What You Can Do to Prevent a Virus Attack In this section you learn about viruses
CatDV Pro Workgroup Serve r
Architectural Overview CatDV Pro Workgroup Server Square Box Systems Ltd May 2003 The CatDV Pro client application is a standalone desktop application, providing video logging and media cataloging capability
Application-Specific Attacks: Leveraging the ActionScript Virtual Machine
IBM Global Technology Services April 2008 Application-Specific Attacks: Leveraging the ActionScript Virtual Machine By Mark Dowd X-Force Researcher IBM Internet Security Systems ([email protected])
Advanced Malware Cleaning Techniques for the IT Professional
Advanced Malware Cleaning Techniques for the IT Professional Mark Russinovich Microsoft Technical Fellow This section of the Microsoft Security Intelligence Report provides information and guidance for
Off-by-One exploitation tutorial
Off-by-One exploitation tutorial By Saif El-Sherei www.elsherei.com Introduction: I decided to get a bit more into Linux exploitation, so I thought it would be nice if I document this as a good friend
Lectures 9 Advanced Operating Systems Fundamental Security. Computer Systems Administration TE2003
Lectures 9 Advanced Operating Systems Fundamental Security Computer Systems Administration TE2003 Lecture overview At the end of lecture 9 students can identify, describe and discuss: Main factors while
Advanced Endpoint Protection Overview
Advanced Endpoint Protection Overview Advanced Endpoint Protection is a solution that prevents Advanced Persistent Threats (APTs) and Zero-Day attacks and enables protection of your endpoints by blocking
Recurrent Patterns Detection Technology. White Paper
SeCure your Network Recurrent Patterns Detection Technology White Paper January, 2007 Powered by RPD Technology Network Based Protection against Email-Borne Threats Spam, Phishing and email-borne Malware
Sophos Anti-Virus for Mac OS X Help
Sophos Anti-Virus for Mac OS X Help For networked and standalone Macs running Mac OS X Product version: 9 Document date: June 2013 Sophos TOC 3 Contents About Sophos Anti-Virus...5 About the Scans window...5
RIA SECURITY TECHNOLOGY
RIA SECURITY TECHNOLOGY Ulysses Wang Security Researcher, Websense Hermes Li Security Researcher, Websense 2009 Websense, Inc. All rights reserved. Agenda RIA Introduction Flash Security Attack Vectors
MRG Effitas Online Banking / Browser Security Assessment Project Q2 2013 Results
MRG Effitas Online Banking / Browser Security Assessment Project Q2 2013 Results 1 Contents: Introduction 3 The Purpose of this Project 3 Tests employed 3 Security Applications Tested 4 Methodology Used
Protect Your IT Infrastructure from Zero-Day Attacks and New Vulnerabilities
Protect Your IT Infrastructure from Zero-Day Attacks and New Vulnerabilities Protecting a business s IT infrastructure is complex. Take, for example, a retailer operating a standard multi-tier infrastructure
ATLAS.ti 6 Using Video Data
ATLAS.ti 6 Using Video Data ATLAS.ti 6 Using Video Data Copyright 2011 by ATLAS.ti Scientific Software Development GmbH, Berlin. All rights reserved. Version: 7.20111212 Author: Clemens Hoffmann, Editor:
F-Secure Internet Security 2014 Data Transfer Declaration
F-Secure Internet Security 2014 Data Transfer Declaration The product s impact on privacy and bandwidth usage F-Secure Corporation April 15 th 2014 Table of Contents Version history... 3 Abstract... 3
