SlideShare una empresa de Scribd logo
1 de 29
Indicators of
Compromise: From
malware analysis to
eradication
MICHAEL BOMAN, MALWARE RESEARCH INSTITUTE
About me
4th year speaking at 44CON
- 2012: Malware as a hobby [P]
- 2013: Controlling a PC using Arduino [WS]
- 2014: Malware analysis as a big data problem [P]
- 2015: Malware anti-reversing [P], Indicators of Compromise [WS]
Malware Researcher, Founder Malware Research Institute
6 kids, one more on the way…
Malware Research Lab, 2012
Malware Research Lab, 2015
Detecting the Unknown
 FBI: There are only two types of companies: those that have been hacked,
and those that will be.
 Always assume that you have been compromised and look for signs to
confirm the assumption
Where to look
 There is gold in those logfiles!
 Firewall
 IDS / IPS
 Proxy
 DNS
 System logfiles
 Netflow data
Firewall
 New sessions are enough, no need to log every packet
 Ingress (incoming) AND Egress (outgoing)
 Denied AND Permitted
IDS / IPS
 Detecting attacks are ”nice”, detecting compromises are ”cool”
 You need actionable information from your IDS / IPS system
 Custom rules are the path to salvation
Proxy
 Detecting known bad sites
 Trace infections to source
 Detecting outliers
DNS
 Log queries
 Establish DNS query & response baseline
 Analyze NXDOMAIN responses
 Analyze successful DNS lookups
 Identify domain name abnormalities
System logfilesWindows 7 regular expressions SOURCE EventID
Number
.*APPCRASH.* Application 1001
.*he protected system file.* Application 64004
.*EMET_DLL Module logged the following event:.* Application 2
.*your virus/spyware.* Application Depends
.*A new process has been created..* Security 4688
.*A service was installed in the system..* Security 4697
.*A scheduled task was created..* Security 4698
.*Logon Type:[W]*(3|10).* Security 4624,
4625
.*SoftwareMicrosoftWindowsCurrentVersionRun.* Security 4657
.*service terminated unexpectedly..* System 7034
.*service was successfully sent a.* System 7035
.*service entered the.* System 7036
.*service was changed from.* System 7040
Netflow data
 WHO is talking to WHOM
 When doing incident response, being able to narrow down the scope is
key
Aquire the sample
 Exctraction from network traffic
 File on disk
 Memory dump
Extracting from Network Traffic
 Wireshark
 GUI
 Network Miner
 GUI
 Foremost
 foremost –v –i /path/to/pcap
 Dshell
 DShell> decode –d rip-http --rip-output_dir=output/ /path/to/pcap
Extracting from Memory
 Creating the memory dump
PsExec.exe HOSTNAME_OR_IP -u DOMAINprivileged_account -p passwd -
c mdd_1.3.exe - -o C:MEMORY.DMP
 Extracting the executable / DLL from the memory dump
volatility dlldump -f MEMORY.DMP -D dumps/
volatility procmemdump -f MEMORY.DMP -D dumps/
Analyze the sample
 Confirm the malicious nature of the suspected sample
 Identify behavior that can be used to identified infected machines
Confirming the sample
 Static analysis
 Dynamic analysis
Cuckoo Sandbox
 Uses DLL-injection techniques to intercept and log specific API calls
 Uses TCPDump to capture network traffic
Minibis
 Uses Microsoft ProcMon inside the instrumented environment
 Uses TCPDump to capture network trafic
 ProcDOT can be used to analyze / visualize the execution process
Identify IOCs
 Identifiable patterns in the sample
 Created files
 Created / Modified registry keys
 Network traffic
 Memory patterns
Mandiant IOC Editor
Yara
rule silent_banker : banker
{
meta:
description = "This is just an example"
thread_level = 3
in_the_wild = true
strings:
$a = {6A 40 68 00 30 00 00 6A 14 8D 91}
$b = {8D 4D B0 2B C1 83 C0 27 99 6A 4E 59 F7 F9}
$c = "UVODFRYSIHLNWPEJXQZAKCBGMT"
condition:
$a and $b and $c
}
Snort
alert tcp $HOME_NET any -> $EXTERNAL_NET 443 ( 
content: "|6A 40 68 00 30 00 00 6A 14 8D 91|"; 
content: "|8D 4D B0 2B C1 83 C0 27 99 6A 4E 59 F7 F9|"; 
content: " UVODFRYSIHLNWPEJXQZAKCBGMT"; 
msg: " silent_banker : banker C2 Traffic"; 
)
Finds unknown C2
servers
Mandiant IOC Finder
Collecting:
mandiant_ioc_finder collect [-o output_dir] [[-d drive]...] [-q] [-v] [-h]
Reporting:
mandiant_ioc_finder report [ [-i input_iocs]...] [-s source_data] [-t html|doc]
[-o output_folder (html) or file (doc)] [-q] [-v] [-h] [-w verbose|summary|off]
Searching Network Traffic
 Firewall
 Detection, Block specific communication
 IDS / IPS
 Create signatures to Detect and Prevent C2 communication, additional
infections
 Proxy
 Detection, Block specific communication
 DNS
 Detection, Block communication to sites
Announcement
Riddle
Announcement
 Public VXCage-server
 Available at vxcage.malwareresearch.institute (http, soon https)
 Feel free to apply for a personal account, free of charge:
 TO: michael@michaelboman.org
 SUBJECT: VXCage Access
 BODY:
 Who you are: name, twitter handle (if any, for cyberstalking), other contact info
 Why you want access
 Proposed username for the system (the password will be generated for you)
 Please contact me at the above address for raw access to the archive
VXCage API: Quick intro
 REST with JSON output
 /malware/add – upload sample
 /malware/get/<sha256> - download sample
 /malware/find – search sample based on hash, date, tag
 /tags/list – list tags
 Docs & Source code at https://github.com/mboman/vxcage
Thank you
Contact Information
 Michael Boman (@mboman)
 michael@michaelboman.org (soon
also
michael.boman@malwareresearch.ins
titute)
 Malware repository:
vxcage.malwareresearch.institute
 Malware blog:
blog.malwareresearch.institute
Tools Mentioned
 Snort, DaemonLogger, PassiveDNS,
SANCP, Wireshark, Network Miner,
Xplico, Dshell, PsExec, MDD, Volatility,
Cuckoo Sandbox, Minibis, ProcDot,
Mandiant OpenIOC Editor, Yara,
Mandiant IOC Finder, Mandiant
Redline

Más contenido relacionado

La actualidad más candente

Introduction of ShinoBOT (Black Hat USA 2013 Arsenal)
Introduction of ShinoBOT (Black Hat USA 2013 Arsenal)Introduction of ShinoBOT (Black Hat USA 2013 Arsenal)
Introduction of ShinoBOT (Black Hat USA 2013 Arsenal)Shota Shinogi
 
Richard wartell malware is hard. let's go shopping!!
Richard wartell   malware is hard.  let's go shopping!!Richard wartell   malware is hard.  let's go shopping!!
Richard wartell malware is hard. let's go shopping!!Shakacon
 
Awesome_fuzzing_for _pentester_red-pill_2017
Awesome_fuzzing_for _pentester_red-pill_2017Awesome_fuzzing_for _pentester_red-pill_2017
Awesome_fuzzing_for _pentester_red-pill_2017Manich Koomsusi
 
Finfisher- Nguyễn Chấn Việt
Finfisher- Nguyễn Chấn ViệtFinfisher- Nguyễn Chấn Việt
Finfisher- Nguyễn Chấn ViệtSecurity Bootcamp
 
Applying Memory Forensics to Rootkit Detection
Applying Memory Forensics to Rootkit DetectionApplying Memory Forensics to Rootkit Detection
Applying Memory Forensics to Rootkit DetectionIgor Korkin
 
Malware analysis using volatility
Malware analysis using volatilityMalware analysis using volatility
Malware analysis using volatilityYashashree Gund
 
Breaking Vaults - Stealing Lastpass Protected Secrets by Martin Vigo
Breaking Vaults - Stealing Lastpass Protected Secrets by Martin VigoBreaking Vaults - Stealing Lastpass Protected Secrets by Martin Vigo
Breaking Vaults - Stealing Lastpass Protected Secrets by Martin VigoShakacon
 
Malware Analysis on a Shoestring Budget
Malware Analysis on a Shoestring BudgetMalware Analysis on a Shoestring Budget
Malware Analysis on a Shoestring BudgetMichael Boman
 
Docker Plugin For DevSecOps
Docker Plugin For DevSecOpsDocker Plugin For DevSecOps
Docker Plugin For DevSecOpsPichaya Morimoto
 
Possibility of arbitrary code execution by Step-Oriented Programming
Possibility of arbitrary code execution by Step-Oriented ProgrammingPossibility of arbitrary code execution by Step-Oriented Programming
Possibility of arbitrary code execution by Step-Oriented Programmingkozossakai
 
Two Challenges of Stealthy Hypervisors Detection: Time Cheating and Data Fluc...
Two Challenges of Stealthy Hypervisors Detection: Time Cheating and Data Fluc...Two Challenges of Stealthy Hypervisors Detection: Time Cheating and Data Fluc...
Two Challenges of Stealthy Hypervisors Detection: Time Cheating and Data Fluc...Igor Korkin
 
Масштабируемый и эффективный фаззинг Google Chrome
Масштабируемый и эффективный фаззинг Google ChromeМасштабируемый и эффективный фаззинг Google Chrome
Масштабируемый и эффективный фаззинг Google ChromePositive Hack Days
 
Windows persistence presentation
Windows persistence presentationWindows persistence presentation
Windows persistence presentationOlehLevytskyi1
 
MemoryRanger Prevents Hijacking FILE_OBJECT Structures in Windows Kernel
MemoryRanger Prevents Hijacking FILE_OBJECT Structures in Windows KernelMemoryRanger Prevents Hijacking FILE_OBJECT Structures in Windows Kernel
MemoryRanger Prevents Hijacking FILE_OBJECT Structures in Windows KernelIgor Korkin
 
Volatile IOCs for Fast Incident Response
Volatile IOCs for Fast Incident ResponseVolatile IOCs for Fast Incident Response
Volatile IOCs for Fast Incident ResponseTakahiro Haruyama
 

La actualidad más candente (20)

Introduction of ShinoBOT (Black Hat USA 2013 Arsenal)
Introduction of ShinoBOT (Black Hat USA 2013 Arsenal)Introduction of ShinoBOT (Black Hat USA 2013 Arsenal)
Introduction of ShinoBOT (Black Hat USA 2013 Arsenal)
 
Richard wartell malware is hard. let's go shopping!!
Richard wartell   malware is hard.  let's go shopping!!Richard wartell   malware is hard.  let's go shopping!!
Richard wartell malware is hard. let's go shopping!!
 
Awesome_fuzzing_for _pentester_red-pill_2017
Awesome_fuzzing_for _pentester_red-pill_2017Awesome_fuzzing_for _pentester_red-pill_2017
Awesome_fuzzing_for _pentester_red-pill_2017
 
Code Injection in Windows
Code Injection in WindowsCode Injection in Windows
Code Injection in Windows
 
Understand study
Understand studyUnderstand study
Understand study
 
Finfisher- Nguyễn Chấn Việt
Finfisher- Nguyễn Chấn ViệtFinfisher- Nguyễn Chấn Việt
Finfisher- Nguyễn Chấn Việt
 
Applying Memory Forensics to Rootkit Detection
Applying Memory Forensics to Rootkit DetectionApplying Memory Forensics to Rootkit Detection
Applying Memory Forensics to Rootkit Detection
 
Malware analysis using volatility
Malware analysis using volatilityMalware analysis using volatility
Malware analysis using volatility
 
ShinoBOT Suite
ShinoBOT SuiteShinoBOT Suite
ShinoBOT Suite
 
Breaking Vaults - Stealing Lastpass Protected Secrets by Martin Vigo
Breaking Vaults - Stealing Lastpass Protected Secrets by Martin VigoBreaking Vaults - Stealing Lastpass Protected Secrets by Martin Vigo
Breaking Vaults - Stealing Lastpass Protected Secrets by Martin Vigo
 
WAF protections and bypass resources
WAF protections and bypass resourcesWAF protections and bypass resources
WAF protections and bypass resources
 
Malware Analysis on a Shoestring Budget
Malware Analysis on a Shoestring BudgetMalware Analysis on a Shoestring Budget
Malware Analysis on a Shoestring Budget
 
Docker Plugin For DevSecOps
Docker Plugin For DevSecOpsDocker Plugin For DevSecOps
Docker Plugin For DevSecOps
 
Possibility of arbitrary code execution by Step-Oriented Programming
Possibility of arbitrary code execution by Step-Oriented ProgrammingPossibility of arbitrary code execution by Step-Oriented Programming
Possibility of arbitrary code execution by Step-Oriented Programming
 
Two Challenges of Stealthy Hypervisors Detection: Time Cheating and Data Fluc...
Two Challenges of Stealthy Hypervisors Detection: Time Cheating and Data Fluc...Two Challenges of Stealthy Hypervisors Detection: Time Cheating and Data Fluc...
Two Challenges of Stealthy Hypervisors Detection: Time Cheating and Data Fluc...
 
0d1n
0d1n0d1n
0d1n
 
Масштабируемый и эффективный фаззинг Google Chrome
Масштабируемый и эффективный фаззинг Google ChromeМасштабируемый и эффективный фаззинг Google Chrome
Масштабируемый и эффективный фаззинг Google Chrome
 
Windows persistence presentation
Windows persistence presentationWindows persistence presentation
Windows persistence presentation
 
MemoryRanger Prevents Hijacking FILE_OBJECT Structures in Windows Kernel
MemoryRanger Prevents Hijacking FILE_OBJECT Structures in Windows KernelMemoryRanger Prevents Hijacking FILE_OBJECT Structures in Windows Kernel
MemoryRanger Prevents Hijacking FILE_OBJECT Structures in Windows Kernel
 
Volatile IOCs for Fast Incident Response
Volatile IOCs for Fast Incident ResponseVolatile IOCs for Fast Incident Response
Volatile IOCs for Fast Incident Response
 

Destacado

44CON London 2015 - Old Dog, New Tricks: Forensics With PowerShell
44CON London 2015 - Old Dog, New Tricks: Forensics With PowerShell44CON London 2015 - Old Dog, New Tricks: Forensics With PowerShell
44CON London 2015 - Old Dog, New Tricks: Forensics With PowerShell44CON
 
44CON London 2015 - DDoS mitigation EPIC FAIL collection
44CON London 2015 - DDoS mitigation EPIC FAIL collection44CON London 2015 - DDoS mitigation EPIC FAIL collection
44CON London 2015 - DDoS mitigation EPIC FAIL collection44CON
 
44CON London 2015 - How to drive a malware analyst crazy
44CON London 2015 - How to drive a malware analyst crazy44CON London 2015 - How to drive a malware analyst crazy
44CON London 2015 - How to drive a malware analyst crazy44CON
 
44CON London 2015 - Inside Terracotta VPN
44CON London 2015 - Inside Terracotta VPN44CON London 2015 - Inside Terracotta VPN
44CON London 2015 - Inside Terracotta VPN44CON
 
44CON @ IPexpo - You're fighting an APT with what exactly?
44CON @ IPexpo - You're fighting an APT with what exactly?44CON @ IPexpo - You're fighting an APT with what exactly?
44CON @ IPexpo - You're fighting an APT with what exactly?44CON
 
44CON London 2015 - Stegosploit - Drive-by Browser Exploits using only Images
44CON London 2015 - Stegosploit - Drive-by Browser Exploits using only Images44CON London 2015 - Stegosploit - Drive-by Browser Exploits using only Images
44CON London 2015 - Stegosploit - Drive-by Browser Exploits using only Images44CON
 

Destacado (6)

44CON London 2015 - Old Dog, New Tricks: Forensics With PowerShell
44CON London 2015 - Old Dog, New Tricks: Forensics With PowerShell44CON London 2015 - Old Dog, New Tricks: Forensics With PowerShell
44CON London 2015 - Old Dog, New Tricks: Forensics With PowerShell
 
44CON London 2015 - DDoS mitigation EPIC FAIL collection
44CON London 2015 - DDoS mitigation EPIC FAIL collection44CON London 2015 - DDoS mitigation EPIC FAIL collection
44CON London 2015 - DDoS mitigation EPIC FAIL collection
 
44CON London 2015 - How to drive a malware analyst crazy
44CON London 2015 - How to drive a malware analyst crazy44CON London 2015 - How to drive a malware analyst crazy
44CON London 2015 - How to drive a malware analyst crazy
 
44CON London 2015 - Inside Terracotta VPN
44CON London 2015 - Inside Terracotta VPN44CON London 2015 - Inside Terracotta VPN
44CON London 2015 - Inside Terracotta VPN
 
44CON @ IPexpo - You're fighting an APT with what exactly?
44CON @ IPexpo - You're fighting an APT with what exactly?44CON @ IPexpo - You're fighting an APT with what exactly?
44CON @ IPexpo - You're fighting an APT with what exactly?
 
44CON London 2015 - Stegosploit - Drive-by Browser Exploits using only Images
44CON London 2015 - Stegosploit - Drive-by Browser Exploits using only Images44CON London 2015 - Stegosploit - Drive-by Browser Exploits using only Images
44CON London 2015 - Stegosploit - Drive-by Browser Exploits using only Images
 

Similar a 44CON London 2015 - Indicators of Compromise: From malware analysis to eradication

Understanding Malware Lateral Spread Used in High Value Attacks
Understanding Malware Lateral Spread Used in High Value AttacksUnderstanding Malware Lateral Spread Used in High Value Attacks
Understanding Malware Lateral Spread Used in High Value AttacksCyphort
 
Breaking the cyber kill chain!
Breaking the cyber kill chain!Breaking the cyber kill chain!
Breaking the cyber kill chain!Nahidul Kibria
 
Malware's Most Wanted: How to tell BADware from adware
Malware's Most Wanted: How to tell BADware from adwareMalware's Most Wanted: How to tell BADware from adware
Malware's Most Wanted: How to tell BADware from adwareCyphort
 
End of Studies project: Malware Repsonse Center
End of Studies project: Malware Repsonse CenterEnd of Studies project: Malware Repsonse Center
End of Studies project: Malware Repsonse CenterAbdessabour Arous
 
Anatomy of an Advanced Retail Breach
Anatomy of an Advanced Retail BreachAnatomy of an Advanced Retail Breach
Anatomy of an Advanced Retail BreachIBM Security
 
IBCAST 2021: Observations and lessons learned from the APNIC Community Honeyn...
IBCAST 2021: Observations and lessons learned from the APNIC Community Honeyn...IBCAST 2021: Observations and lessons learned from the APNIC Community Honeyn...
IBCAST 2021: Observations and lessons learned from the APNIC Community Honeyn...APNIC
 
Unmasking Careto through Memory Forensics (video in description)
Unmasking Careto through Memory Forensics (video in description)Unmasking Careto through Memory Forensics (video in description)
Unmasking Careto through Memory Forensics (video in description)Andrew Case
 
DrupalCamp London 2017 - Web site insecurity
DrupalCamp London 2017 - Web site insecurity DrupalCamp London 2017 - Web site insecurity
DrupalCamp London 2017 - Web site insecurity George Boobyer
 
2012.09 A Million Mousetraps: Using Big Data and Little Loops to Build Better...
2012.09 A Million Mousetraps: Using Big Data and Little Loops to Build Better...2012.09 A Million Mousetraps: Using Big Data and Little Loops to Build Better...
2012.09 A Million Mousetraps: Using Big Data and Little Loops to Build Better...Allison Miller
 
Splunk Enterpise for Information Security Hands-On
Splunk Enterpise for Information Security Hands-OnSplunk Enterpise for Information Security Hands-On
Splunk Enterpise for Information Security Hands-OnSplunk
 
Formbook - In-depth malware analysis (Botconf 2018)
Formbook - In-depth malware analysis (Botconf 2018)Formbook - In-depth malware analysis (Botconf 2018)
Formbook - In-depth malware analysis (Botconf 2018)Rémi Jullian
 
DEF CON 27 - DANIEL ROMERO and MARIO RIVAS - why you should fear your mundane...
DEF CON 27 - DANIEL ROMERO and MARIO RIVAS - why you should fear your mundane...DEF CON 27 - DANIEL ROMERO and MARIO RIVAS - why you should fear your mundane...
DEF CON 27 - DANIEL ROMERO and MARIO RIVAS - why you should fear your mundane...Felipe Prado
 
The Indicators of Compromise
The Indicators of CompromiseThe Indicators of Compromise
The Indicators of CompromiseTomasz Jakubowski
 
CEHv10 M0 Introduction.pptx
CEHv10 M0 Introduction.pptxCEHv10 M0 Introduction.pptx
CEHv10 M0 Introduction.pptxYasserOuda2
 
(In) Security graph database in real world
(In) Security graph database in real world (In) Security graph database in real world
(In) Security graph database in real world Miguel Hernández Boza
 

Similar a 44CON London 2015 - Indicators of Compromise: From malware analysis to eradication (20)

Understanding Malware Lateral Spread Used in High Value Attacks
Understanding Malware Lateral Spread Used in High Value AttacksUnderstanding Malware Lateral Spread Used in High Value Attacks
Understanding Malware Lateral Spread Used in High Value Attacks
 
Breaking the cyber kill chain!
Breaking the cyber kill chain!Breaking the cyber kill chain!
Breaking the cyber kill chain!
 
Malware's Most Wanted: How to tell BADware from adware
Malware's Most Wanted: How to tell BADware from adwareMalware's Most Wanted: How to tell BADware from adware
Malware's Most Wanted: How to tell BADware from adware
 
End of Studies project: Malware Repsonse Center
End of Studies project: Malware Repsonse CenterEnd of Studies project: Malware Repsonse Center
End of Studies project: Malware Repsonse Center
 
Malware Detection With Multiple Features
Malware Detection With Multiple FeaturesMalware Detection With Multiple Features
Malware Detection With Multiple Features
 
Anatomy of an Advanced Retail Breach
Anatomy of an Advanced Retail BreachAnatomy of an Advanced Retail Breach
Anatomy of an Advanced Retail Breach
 
IBCAST 2021: Observations and lessons learned from the APNIC Community Honeyn...
IBCAST 2021: Observations and lessons learned from the APNIC Community Honeyn...IBCAST 2021: Observations and lessons learned from the APNIC Community Honeyn...
IBCAST 2021: Observations and lessons learned from the APNIC Community Honeyn...
 
Unmasking Careto through Memory Forensics (video in description)
Unmasking Careto through Memory Forensics (video in description)Unmasking Careto through Memory Forensics (video in description)
Unmasking Careto through Memory Forensics (video in description)
 
Hacking
HackingHacking
Hacking
 
Hacking
HackingHacking
Hacking
 
DrupalCamp London 2017 - Web site insecurity
DrupalCamp London 2017 - Web site insecurity DrupalCamp London 2017 - Web site insecurity
DrupalCamp London 2017 - Web site insecurity
 
RAT - Repurposing Adversarial Tradecraft
RAT - Repurposing Adversarial TradecraftRAT - Repurposing Adversarial Tradecraft
RAT - Repurposing Adversarial Tradecraft
 
2012.09 A Million Mousetraps: Using Big Data and Little Loops to Build Better...
2012.09 A Million Mousetraps: Using Big Data and Little Loops to Build Better...2012.09 A Million Mousetraps: Using Big Data and Little Loops to Build Better...
2012.09 A Million Mousetraps: Using Big Data and Little Loops to Build Better...
 
Splunk Enterpise for Information Security Hands-On
Splunk Enterpise for Information Security Hands-OnSplunk Enterpise for Information Security Hands-On
Splunk Enterpise for Information Security Hands-On
 
Formbook - In-depth malware analysis (Botconf 2018)
Formbook - In-depth malware analysis (Botconf 2018)Formbook - In-depth malware analysis (Botconf 2018)
Formbook - In-depth malware analysis (Botconf 2018)
 
Hacking tutorial
Hacking tutorialHacking tutorial
Hacking tutorial
 
DEF CON 27 - DANIEL ROMERO and MARIO RIVAS - why you should fear your mundane...
DEF CON 27 - DANIEL ROMERO and MARIO RIVAS - why you should fear your mundane...DEF CON 27 - DANIEL ROMERO and MARIO RIVAS - why you should fear your mundane...
DEF CON 27 - DANIEL ROMERO and MARIO RIVAS - why you should fear your mundane...
 
The Indicators of Compromise
The Indicators of CompromiseThe Indicators of Compromise
The Indicators of Compromise
 
CEHv10 M0 Introduction.pptx
CEHv10 M0 Introduction.pptxCEHv10 M0 Introduction.pptx
CEHv10 M0 Introduction.pptx
 
(In) Security graph database in real world
(In) Security graph database in real world (In) Security graph database in real world
(In) Security graph database in real world
 

Más de 44CON

They're All Scorpions - Successful SecOps in a Hostile Workplace - Pete Herzo...
They're All Scorpions - Successful SecOps in a Hostile Workplace - Pete Herzo...They're All Scorpions - Successful SecOps in a Hostile Workplace - Pete Herzo...
They're All Scorpions - Successful SecOps in a Hostile Workplace - Pete Herzo...44CON
 
How to Explain Post-Quantum Cryptography to a Middle School Student - Klaus S...
How to Explain Post-Quantum Cryptography to a Middle School Student - Klaus S...How to Explain Post-Quantum Cryptography to a Middle School Student - Klaus S...
How to Explain Post-Quantum Cryptography to a Middle School Student - Klaus S...44CON
 
Using SmartNICs to Provide Better Data Center Security - Jack Matheson - 44CO...
Using SmartNICs to Provide Better Data Center Security - Jack Matheson - 44CO...Using SmartNICs to Provide Better Data Center Security - Jack Matheson - 44CO...
Using SmartNICs to Provide Better Data Center Security - Jack Matheson - 44CO...44CON
 
JARVIS never saw it coming: Hacking machine learning (ML) in speech, text and...
JARVIS never saw it coming: Hacking machine learning (ML) in speech, text and...JARVIS never saw it coming: Hacking machine learning (ML) in speech, text and...
JARVIS never saw it coming: Hacking machine learning (ML) in speech, text and...44CON
 
Reverse Engineering and Bug Hunting on KMDF Drivers - Enrique Nissim - 44CON ...
Reverse Engineering and Bug Hunting on KMDF Drivers - Enrique Nissim - 44CON ...Reverse Engineering and Bug Hunting on KMDF Drivers - Enrique Nissim - 44CON ...
Reverse Engineering and Bug Hunting on KMDF Drivers - Enrique Nissim - 44CON ...44CON
 
The UK's Code of Practice for Security in Consumer IoT Products and Services ...
The UK's Code of Practice for Security in Consumer IoT Products and Services ...The UK's Code of Practice for Security in Consumer IoT Products and Services ...
The UK's Code of Practice for Security in Consumer IoT Products and Services ...44CON
 
Weak analogies make poor realities – are we sitting on a Security Debt Crisis...
Weak analogies make poor realities – are we sitting on a Security Debt Crisis...Weak analogies make poor realities – are we sitting on a Security Debt Crisis...
Weak analogies make poor realities – are we sitting on a Security Debt Crisis...44CON
 
Pwning the 44CON Nerf Tank
Pwning the 44CON Nerf TankPwning the 44CON Nerf Tank
Pwning the 44CON Nerf Tank44CON
 
Security module for php7 – Killing bugclasses and virtual-patching the rest! ...
Security module for php7 – Killing bugclasses and virtual-patching the rest! ...Security module for php7 – Killing bugclasses and virtual-patching the rest! ...
Security module for php7 – Killing bugclasses and virtual-patching the rest! ...44CON
 
44CON London 2015 - Is there an EFI monster inside your apple?
44CON London 2015 - Is there an EFI monster inside your apple?44CON London 2015 - Is there an EFI monster inside your apple?
44CON London 2015 - Is there an EFI monster inside your apple?44CON
 
44CON London 2015 - Going AUTH the Rails on a Crazy Train
44CON London 2015 - Going AUTH the Rails on a Crazy Train44CON London 2015 - Going AUTH the Rails on a Crazy Train
44CON London 2015 - Going AUTH the Rails on a Crazy Train44CON
 
44CON London 2015 - Software Defined Networking (SDN) Security
44CON London 2015 - Software Defined Networking (SDN) Security44CON London 2015 - Software Defined Networking (SDN) Security
44CON London 2015 - Software Defined Networking (SDN) Security44CON
 
44CON London 2015 - Hunting Asynchronous Vulnerabilities
44CON London 2015 - Hunting Asynchronous Vulnerabilities44CON London 2015 - Hunting Asynchronous Vulnerabilities
44CON London 2015 - Hunting Asynchronous Vulnerabilities44CON
 
44CON London 2015 - Reverse engineering and exploiting font rasterizers: the ...
44CON London 2015 - Reverse engineering and exploiting font rasterizers: the ...44CON London 2015 - Reverse engineering and exploiting font rasterizers: the ...
44CON London 2015 - Reverse engineering and exploiting font rasterizers: the ...44CON
 
44CON London 2015 - Jtagsploitation: 5 wires, 5 ways to root
44CON London 2015 - Jtagsploitation: 5 wires, 5 ways to root44CON London 2015 - Jtagsploitation: 5 wires, 5 ways to root
44CON London 2015 - Jtagsploitation: 5 wires, 5 ways to root44CON
 
44CON London 2015 - reverse reverse engineering
44CON London 2015 - reverse reverse engineering44CON London 2015 - reverse reverse engineering
44CON London 2015 - reverse reverse engineering44CON
 
44CON London 2015 - Windows 10: 2 Steps Forward, 1 Step Back
44CON London 2015 - Windows 10: 2 Steps Forward, 1 Step Back44CON London 2015 - Windows 10: 2 Steps Forward, 1 Step Back
44CON London 2015 - Windows 10: 2 Steps Forward, 1 Step Back44CON
 
44CON London 2015 - Playing with Fire: Attacking the FireEye MPS
44CON London 2015 - Playing with Fire: Attacking the FireEye MPS44CON London 2015 - Playing with Fire: Attacking the FireEye MPS
44CON London 2015 - Playing with Fire: Attacking the FireEye MPS44CON
 
44CON London 2015 - Smart Muttering; a story and toolset for smart meter plat...
44CON London 2015 - Smart Muttering; a story and toolset for smart meter plat...44CON London 2015 - Smart Muttering; a story and toolset for smart meter plat...
44CON London 2015 - Smart Muttering; a story and toolset for smart meter plat...44CON
 
44CON 2014 - Simple Hardware Sidechannel Attacks for 10 GBP or Less, Joe Fitz...
44CON 2014 - Simple Hardware Sidechannel Attacks for 10 GBP or Less, Joe Fitz...44CON 2014 - Simple Hardware Sidechannel Attacks for 10 GBP or Less, Joe Fitz...
44CON 2014 - Simple Hardware Sidechannel Attacks for 10 GBP or Less, Joe Fitz...44CON
 

Más de 44CON (20)

They're All Scorpions - Successful SecOps in a Hostile Workplace - Pete Herzo...
They're All Scorpions - Successful SecOps in a Hostile Workplace - Pete Herzo...They're All Scorpions - Successful SecOps in a Hostile Workplace - Pete Herzo...
They're All Scorpions - Successful SecOps in a Hostile Workplace - Pete Herzo...
 
How to Explain Post-Quantum Cryptography to a Middle School Student - Klaus S...
How to Explain Post-Quantum Cryptography to a Middle School Student - Klaus S...How to Explain Post-Quantum Cryptography to a Middle School Student - Klaus S...
How to Explain Post-Quantum Cryptography to a Middle School Student - Klaus S...
 
Using SmartNICs to Provide Better Data Center Security - Jack Matheson - 44CO...
Using SmartNICs to Provide Better Data Center Security - Jack Matheson - 44CO...Using SmartNICs to Provide Better Data Center Security - Jack Matheson - 44CO...
Using SmartNICs to Provide Better Data Center Security - Jack Matheson - 44CO...
 
JARVIS never saw it coming: Hacking machine learning (ML) in speech, text and...
JARVIS never saw it coming: Hacking machine learning (ML) in speech, text and...JARVIS never saw it coming: Hacking machine learning (ML) in speech, text and...
JARVIS never saw it coming: Hacking machine learning (ML) in speech, text and...
 
Reverse Engineering and Bug Hunting on KMDF Drivers - Enrique Nissim - 44CON ...
Reverse Engineering and Bug Hunting on KMDF Drivers - Enrique Nissim - 44CON ...Reverse Engineering and Bug Hunting on KMDF Drivers - Enrique Nissim - 44CON ...
Reverse Engineering and Bug Hunting on KMDF Drivers - Enrique Nissim - 44CON ...
 
The UK's Code of Practice for Security in Consumer IoT Products and Services ...
The UK's Code of Practice for Security in Consumer IoT Products and Services ...The UK's Code of Practice for Security in Consumer IoT Products and Services ...
The UK's Code of Practice for Security in Consumer IoT Products and Services ...
 
Weak analogies make poor realities – are we sitting on a Security Debt Crisis...
Weak analogies make poor realities – are we sitting on a Security Debt Crisis...Weak analogies make poor realities – are we sitting on a Security Debt Crisis...
Weak analogies make poor realities – are we sitting on a Security Debt Crisis...
 
Pwning the 44CON Nerf Tank
Pwning the 44CON Nerf TankPwning the 44CON Nerf Tank
Pwning the 44CON Nerf Tank
 
Security module for php7 – Killing bugclasses and virtual-patching the rest! ...
Security module for php7 – Killing bugclasses and virtual-patching the rest! ...Security module for php7 – Killing bugclasses and virtual-patching the rest! ...
Security module for php7 – Killing bugclasses and virtual-patching the rest! ...
 
44CON London 2015 - Is there an EFI monster inside your apple?
44CON London 2015 - Is there an EFI monster inside your apple?44CON London 2015 - Is there an EFI monster inside your apple?
44CON London 2015 - Is there an EFI monster inside your apple?
 
44CON London 2015 - Going AUTH the Rails on a Crazy Train
44CON London 2015 - Going AUTH the Rails on a Crazy Train44CON London 2015 - Going AUTH the Rails on a Crazy Train
44CON London 2015 - Going AUTH the Rails on a Crazy Train
 
44CON London 2015 - Software Defined Networking (SDN) Security
44CON London 2015 - Software Defined Networking (SDN) Security44CON London 2015 - Software Defined Networking (SDN) Security
44CON London 2015 - Software Defined Networking (SDN) Security
 
44CON London 2015 - Hunting Asynchronous Vulnerabilities
44CON London 2015 - Hunting Asynchronous Vulnerabilities44CON London 2015 - Hunting Asynchronous Vulnerabilities
44CON London 2015 - Hunting Asynchronous Vulnerabilities
 
44CON London 2015 - Reverse engineering and exploiting font rasterizers: the ...
44CON London 2015 - Reverse engineering and exploiting font rasterizers: the ...44CON London 2015 - Reverse engineering and exploiting font rasterizers: the ...
44CON London 2015 - Reverse engineering and exploiting font rasterizers: the ...
 
44CON London 2015 - Jtagsploitation: 5 wires, 5 ways to root
44CON London 2015 - Jtagsploitation: 5 wires, 5 ways to root44CON London 2015 - Jtagsploitation: 5 wires, 5 ways to root
44CON London 2015 - Jtagsploitation: 5 wires, 5 ways to root
 
44CON London 2015 - reverse reverse engineering
44CON London 2015 - reverse reverse engineering44CON London 2015 - reverse reverse engineering
44CON London 2015 - reverse reverse engineering
 
44CON London 2015 - Windows 10: 2 Steps Forward, 1 Step Back
44CON London 2015 - Windows 10: 2 Steps Forward, 1 Step Back44CON London 2015 - Windows 10: 2 Steps Forward, 1 Step Back
44CON London 2015 - Windows 10: 2 Steps Forward, 1 Step Back
 
44CON London 2015 - Playing with Fire: Attacking the FireEye MPS
44CON London 2015 - Playing with Fire: Attacking the FireEye MPS44CON London 2015 - Playing with Fire: Attacking the FireEye MPS
44CON London 2015 - Playing with Fire: Attacking the FireEye MPS
 
44CON London 2015 - Smart Muttering; a story and toolset for smart meter plat...
44CON London 2015 - Smart Muttering; a story and toolset for smart meter plat...44CON London 2015 - Smart Muttering; a story and toolset for smart meter plat...
44CON London 2015 - Smart Muttering; a story and toolset for smart meter plat...
 
44CON 2014 - Simple Hardware Sidechannel Attacks for 10 GBP or Less, Joe Fitz...
44CON 2014 - Simple Hardware Sidechannel Attacks for 10 GBP or Less, Joe Fitz...44CON 2014 - Simple Hardware Sidechannel Attacks for 10 GBP or Less, Joe Fitz...
44CON 2014 - Simple Hardware Sidechannel Attacks for 10 GBP or Less, Joe Fitz...
 

Último

What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfMounikaPolabathina
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfPrecisely
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxBkGupta21
 

Último (20)

What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdf
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptx
 

44CON London 2015 - Indicators of Compromise: From malware analysis to eradication

  • 1. Indicators of Compromise: From malware analysis to eradication MICHAEL BOMAN, MALWARE RESEARCH INSTITUTE
  • 2. About me 4th year speaking at 44CON - 2012: Malware as a hobby [P] - 2013: Controlling a PC using Arduino [WS] - 2014: Malware analysis as a big data problem [P] - 2015: Malware anti-reversing [P], Indicators of Compromise [WS] Malware Researcher, Founder Malware Research Institute 6 kids, one more on the way…
  • 5. Detecting the Unknown  FBI: There are only two types of companies: those that have been hacked, and those that will be.  Always assume that you have been compromised and look for signs to confirm the assumption
  • 6. Where to look  There is gold in those logfiles!  Firewall  IDS / IPS  Proxy  DNS  System logfiles  Netflow data
  • 7. Firewall  New sessions are enough, no need to log every packet  Ingress (incoming) AND Egress (outgoing)  Denied AND Permitted
  • 8. IDS / IPS  Detecting attacks are ”nice”, detecting compromises are ”cool”  You need actionable information from your IDS / IPS system  Custom rules are the path to salvation
  • 9. Proxy  Detecting known bad sites  Trace infections to source  Detecting outliers
  • 10. DNS  Log queries  Establish DNS query & response baseline  Analyze NXDOMAIN responses  Analyze successful DNS lookups  Identify domain name abnormalities
  • 11. System logfilesWindows 7 regular expressions SOURCE EventID Number .*APPCRASH.* Application 1001 .*he protected system file.* Application 64004 .*EMET_DLL Module logged the following event:.* Application 2 .*your virus/spyware.* Application Depends .*A new process has been created..* Security 4688 .*A service was installed in the system..* Security 4697 .*A scheduled task was created..* Security 4698 .*Logon Type:[W]*(3|10).* Security 4624, 4625 .*SoftwareMicrosoftWindowsCurrentVersionRun.* Security 4657 .*service terminated unexpectedly..* System 7034 .*service was successfully sent a.* System 7035 .*service entered the.* System 7036 .*service was changed from.* System 7040
  • 12. Netflow data  WHO is talking to WHOM  When doing incident response, being able to narrow down the scope is key
  • 13. Aquire the sample  Exctraction from network traffic  File on disk  Memory dump
  • 14. Extracting from Network Traffic  Wireshark  GUI  Network Miner  GUI  Foremost  foremost –v –i /path/to/pcap  Dshell  DShell> decode –d rip-http --rip-output_dir=output/ /path/to/pcap
  • 15. Extracting from Memory  Creating the memory dump PsExec.exe HOSTNAME_OR_IP -u DOMAINprivileged_account -p passwd - c mdd_1.3.exe - -o C:MEMORY.DMP  Extracting the executable / DLL from the memory dump volatility dlldump -f MEMORY.DMP -D dumps/ volatility procmemdump -f MEMORY.DMP -D dumps/
  • 16. Analyze the sample  Confirm the malicious nature of the suspected sample  Identify behavior that can be used to identified infected machines
  • 17. Confirming the sample  Static analysis  Dynamic analysis
  • 18. Cuckoo Sandbox  Uses DLL-injection techniques to intercept and log specific API calls  Uses TCPDump to capture network traffic
  • 19. Minibis  Uses Microsoft ProcMon inside the instrumented environment  Uses TCPDump to capture network trafic  ProcDOT can be used to analyze / visualize the execution process
  • 20. Identify IOCs  Identifiable patterns in the sample  Created files  Created / Modified registry keys  Network traffic  Memory patterns
  • 22. Yara rule silent_banker : banker { meta: description = "This is just an example" thread_level = 3 in_the_wild = true strings: $a = {6A 40 68 00 30 00 00 6A 14 8D 91} $b = {8D 4D B0 2B C1 83 C0 27 99 6A 4E 59 F7 F9} $c = "UVODFRYSIHLNWPEJXQZAKCBGMT" condition: $a and $b and $c }
  • 23. Snort alert tcp $HOME_NET any -> $EXTERNAL_NET 443 ( content: "|6A 40 68 00 30 00 00 6A 14 8D 91|"; content: "|8D 4D B0 2B C1 83 C0 27 99 6A 4E 59 F7 F9|"; content: " UVODFRYSIHLNWPEJXQZAKCBGMT"; msg: " silent_banker : banker C2 Traffic"; ) Finds unknown C2 servers
  • 24. Mandiant IOC Finder Collecting: mandiant_ioc_finder collect [-o output_dir] [[-d drive]...] [-q] [-v] [-h] Reporting: mandiant_ioc_finder report [ [-i input_iocs]...] [-s source_data] [-t html|doc] [-o output_folder (html) or file (doc)] [-q] [-v] [-h] [-w verbose|summary|off]
  • 25. Searching Network Traffic  Firewall  Detection, Block specific communication  IDS / IPS  Create signatures to Detect and Prevent C2 communication, additional infections  Proxy  Detection, Block specific communication  DNS  Detection, Block communication to sites
  • 27. Announcement  Public VXCage-server  Available at vxcage.malwareresearch.institute (http, soon https)  Feel free to apply for a personal account, free of charge:  TO: michael@michaelboman.org  SUBJECT: VXCage Access  BODY:  Who you are: name, twitter handle (if any, for cyberstalking), other contact info  Why you want access  Proposed username for the system (the password will be generated for you)  Please contact me at the above address for raw access to the archive
  • 28. VXCage API: Quick intro  REST with JSON output  /malware/add – upload sample  /malware/get/<sha256> - download sample  /malware/find – search sample based on hash, date, tag  /tags/list – list tags  Docs & Source code at https://github.com/mboman/vxcage
  • 29. Thank you Contact Information  Michael Boman (@mboman)  michael@michaelboman.org (soon also michael.boman@malwareresearch.ins titute)  Malware repository: vxcage.malwareresearch.institute  Malware blog: blog.malwareresearch.institute Tools Mentioned  Snort, DaemonLogger, PassiveDNS, SANCP, Wireshark, Network Miner, Xplico, Dshell, PsExec, MDD, Volatility, Cuckoo Sandbox, Minibis, ProcDot, Mandiant OpenIOC Editor, Yara, Mandiant IOC Finder, Mandiant Redline

Notas del editor

  1. Hi! Good mom. Thanks for having me. My name is Michael Boman and I am a Senior Malware Analyst at the Malware Research Institute, an organization that promotes malware research and tools and techniques for malware analysis. We are a young organization, just started out this year.  I myself have been speaking on the topic of malware analysis at conferences like 44CON in London and DEEPSEC in Vienna as well as at different OWASP chapters here in Sweden. This talk will cover things like network monitoring, network forensics, log analysis, memory accusition, malware analysis, creating signatures for files and network traffic etc, all topics worth a talk on their own so please excuse me if I don't go into great details on every single topic.
  2. FBI recently said that basically everyone is or going to be hacked, and that your organization is either a target because you have something of value or that you can be leverage to gain something of value – or just for the LOLs.   If you assume that your systems and network infrastructure is compromised, how would you act differently? And how would you go about to identify the compromised assets?   <open feedback – whiteboard>
  3. You might already have many of the systems on the list, but are you using them to the fullest? Make use of your existing IT investment. Firewalls can be used to so much more then just to block traffic, with the right rules your IDS or IPS can do much more then just detecting attacks, the proxy you have to cache internet traffic or prevent users to surf questionable sites can also be used to detect malware infections. Have you ever thought about using the DNS? You know - the service which lets you type www.facebook.com instead of  31.13.64.1 - for malware hunting? The system logs. used correctly, is a gold mine for incident response and you know your network switches? They are sitting on a gold mine when it comes to traffic analysis! Don't start spending a lot of money on new toys, learn how to use the tools you already have in a new, efficient way.
  4. Your firewall has real gold if you do your logging right. A few years back while I was working as a consultant me and a college was assigned to a municipality who was informed by their ISP that if they don’t stop spamming they will terminate their internet connection, and as their internet connection was providing everything from the local schools to city hall they were in a bit of panic. They didn’t have any fancy equipment, not even any particular new one at that, so sniffing traffic was kind of a headache. So what we did was blocking outgoing traffic on port 25 – That’s SMTP which is used for sending email out – from everything that isn’t their official email server and then log all blocked connections. That became their source of machines to take in and re-image. I was told that the first machine belonged to a student who got his laptop repossessed from him in the middle of class by fairly large 3 IT-guys… Anyway, so make sure your firewall does not only block everything you don’t want IN OR OUT of your network, and that you log traffic regardless if you permit it or not. And I don’t mean that you need to log every single packet, but all new connections is a good start.
  5. How many of you have got an IDS or IPS? Raise your hands. For those who have one, what are you looking for? Does your vendor support custom rules, and by that I mean are you able to write your own signatures and have you created any custom rules specific for your organization? One cool custom rule one can write is one that alerts, or logs, any traffic that goes to your ”dark” IP:s, meaning IP:s that you haven’t assigned to a host yet. As it is unused there shouldn’t be any traffic except misconfigured systems and attacks, both worth knowing about. Another important thing to take note of from your IDS or IPS is answer to the question: “Did it succeed?” Frankly, I don’t care if we got 10 thousand attacks against our system in the last 24 hours, what I want to know: “DID ANY OF THEM SUCCEED”? Make sure that if you are looking for an IDS or IPS solution it can help you answer that question. If you can you should record all network traffic data using something like daemon logger – available at sourceforge – which logs all the packets to disk, removing old packet captures based on configuration. Having full packet captures are golden because even if you missed the initial attack or need to verify if the attack was successful you still have the ability to do so.
  6. How many of you work in an organization that, for whatever reason, forces you to surf through a proxy? Raise your hands. Are those requests logged? Is anyone looking at those logs for anything more than “damn you surf the internet a lot” statistics? Doing some analysis of those logs can be a useful source for indications of compromise. What to look at are hostnames, urls and downloaded files and user agents, and it a great source for finding additional comprised systems. You can also use the proxy logs to detect data exfiltration by looking at POST requests and their sizes.
  7. How about DNS traffic? Does anyone monitor your DNS traffic? What you need to do is to start logging DNS queries and responses. You can either configure your local resolver to perform this logging or use packet capture techniques to log them. I would recommend that you use something like PassiveDNS - an open source tool written in Python and available on Github - to achive this goal as you don’t need to make any changes to your DNS infrastructure to get the data. If you place your sensor right you will also detect traffic that goes directly to external resolvers. Once you have collected DNS requests and response it is time to analyze the data. The first thing you need to do is to establish a baseline. How does ”business as usual” look in your environment? Unfortunatly all environments are different so I can’t give you any shorthand tips on how it should look like. After you have created a baseline you can take a look at all the NXDOMAIN responses. NXDOMAIN is the response you get when the hostname doesn’t resolve. This datapoint is extremely useful as domain generating algorithms used by malware fails a lot, because the bad guy only need successful response on one of the possible domains to control the botnet and it can be quite expensive to buy more domains then required. By logging successful DNS lookups you can detect when a DNS entry changes from one IP to another, or an IP has several hostnames (the hosting server is supplying malware under many different DNS names). Suddenly you can find a whole bunch of new malware distributing sites just by looking at DNS requests and responses? Isn't that cool? DGA - Domain Generation Algorithms - are used to create domains for C2 communication and they can make it very hard to block the traffic on a domain name level, but on the other hand DGAs generates very distinct and easy-to-spot domain names which you can locate using statistical analysis. You should also compare DNS requests with known malicious domain names using blacklists from sites from Malc0de, Malware Domain List, Malware URLs, VX Vault, URLquery, CleanMX, ZeusTracker etc. and use the result as a input for further analysis. Another data source to add to the DNS data is WHOIS information about the registrator and who registered the domain and how old the domain is.
  8. How about system log files, are you actively collecting and looking through those logs for signs of compromise? <CLICK> Crashed applications, new services and scheduled jobs are just a few of many log entries that can indicate a system compromise. The approach you need to take is to filter out known good an investigate all other events. SANS Institute has several good Intrusion Discovery Cheat Sheet for both Windows and Linux systems. One way to harden your Windows machines is to install EMET, the Microsoft Enhanced Mitigation Experience Toolkit, is a free utility that helps prevent vulnerabilities in software from being successfully exploited. EMET achieves this goal by using security mitigation technologies like: Data execution prevention -- a security feature that helps prevents code in system memory from being used incorrectly Mandatory address space layout randomization -- a technology that makes it difficult for exploits to find specific addresses in a system's memory Structured exception handler overwrite protection -- a mitigation that blocks exploits that attempt to exploit stack overflows Export address table access filtering -- a technology that blocks an exploit's ability to find the location of a function Anti-Return Oriented Programming -- a mitigation technique that prevents hackers from bypassing DEP SSL/TLS certificate trust pinning -- a feature that helps detect man-in-the-middle attacks leveraging the public key infrastructure Apart from hardening the Windows system it will feed additional events to the system and security logs when the exploit fails.
  9. Is ANYONE here collecting net flow data which contains information on WHO is talking to WHOM? Netflow is the protocol that keeps track on who speaks to whom, when and what ports are being used as well as how much data is being transfered. In a incident response scenario, being able to map about what servers are talking to each other is a gold mine and a life saver. Think about it, any machine the compromised machine has spoken to is potentionally compromised, and those machines that has not been contacted is fairly unlikely to be affected. This is very useful to know when your kick in your triage kit to verify if the system has been compromised, as it could be a resource intensive action to look at signs of compromise and think about the need to reinstall compromised machines from a  known good state to make sure that the infection has been erradicated? Would you reinstall perfectly healty systems because you didn't know the scope of the compromise? How about missing a system or two? You can't go around and nuke the whole IT infrastructure just because Alice in HR got infected while opening a job application... If you can’t use Netflow from your network infrastructure you can use SANCP (Security Analyst Network Connection Profiler) to extract the same kind on information. I am telling you, there are gold in those logs!
  10. Let’s say that you now found an infected machine and you have decided to take a look at the particular malware. I believe this is a very important step, don’t just re-image the system and walk away. I’d say it is your duty as a security guy to know why your defenses failed and also make sure you got a complete scoop of the infection. Is it only this particular machine that is compromised or is it elsewhere in your organization? First of all you need to get hold of the sample. Grabbing the initial exploit and downloader can be challenging because maybe it was just an in-memory kind of thing, but if the attacker wants persistence – meaning surviving a simple reboot – they will need to commit some data to disk. Maybe you can’t get hold of all the different parts of the compromise but some is better than none. When things gets really challenging is when the binary on disk is encrypted, in which case you want to grab a copy from running memory which has to be unencrypted to be able to run. There are plenty of anti-forensic techniques to stop this as well but fortunately they are not too common yet.
  11. Let's start with extracting files from the network traffic. You can do it in many ways using tools like Wireshark, NetworkMiner, Foremost and Dshell – among others. Foremost is a open source file carving tool originally developed by US Air Force. It is mainly used for extracting files from hard drives or hard drive images but can be used to extract files from network captures are well. Dshell is an extensible network forensic analysis framework which enables rapid development of plugins to support the dissection of network packet captures. To extract files you just issue decode –d rip-http --rip-output_dir=output/ /path/to/pcap. Optionally you can specify using the --rip-http_content_filter and –rip-http_name_fiter options what kind and/or names of files you want to extract. DShell is quite a new tool, but can replace many other tools mentioned like PassiveDNS and SANCP for Netflow-like output. That said, DShell is more of a analysis and interactive tool so you still want to use PassiveDNS and Netflow or SANCP for collecting data.
  12. MDD, or Memory Data Dumper, is a physical memory acquisition tool for imaging Windows based computers. It is like the unix-tool DD, but for memory. Used together with PsExec from Microsoft Sysinternals you can execute it on remote machines as long as you have a privileged account like a domain administrator. The resulting file is the same size as the physical RAM on the system. Mandiant Memoryze is another tool you can use to grab the RAM. If you are trying this from a Linux environment you could use Metasploit instead of PsExec to execute commands remotely using the credentials of a privileged account. Once you got a memory dump it is time to extract the malware from it. For this you can either use DLLDUMP command for extracting DLL-files or PROCMEMDUMP to extract executables. If the malware has some anti-forensics enabled it will be more difficult to dump the RAM and extract the malware from the memory image.
  13. Once you got hold of the malware sample you need to analyze it for capabilities and make sure you are acting on a real compromise. This step is important so you don't waste resources and activating incident management procedures for benign files. You also need to find out what kind of damage the malware has done, what kind of information has been sought and possible been compromised, what damage has the malware possible been doing?  
  14. There are two ways to analyze code: static and dynamic. Static is when you pick the binary apart and look at what libraries it imports, what strings it has even loading the code into a disassembler like IDA Pro.   Dynamic analysis is when you run the sample in a instrumented environment, which is a fancy word to describe that you in some way detect and log what the malware does to the system. It can range from using regshot available at sourceforge [http://sourceforge.net/projects/regshot/] and sysdiff, a now discontinues tool from Microsoft to customized hypervisors. The problem with using regshot and sysdiff is that it doesn’t record temporary files and registry entries that are created and removed between the different snapshots.
  15. Cuckoo Sandbox is using DLL-injection technique to “hijack” API calls of interest and tcpdump to record network traffic to and from the instrumented system. I can also take optional screenshots at configurable intervals. The drawback from this approach is that DLL-injection can be discovered and that it will miss any API-call it haven’t specifically been told to log. Over all it is a very nice tool that has a lots of features to simulate user interactivity and detect suspect behavior using behavior-based signatures.   You can download Cuckoo from cuckoo sandbox DOT org.
  16. Minibis uses ProcMon from Microsoft, former SysInternals, to record what is happening on the system and tcpdump to record traffic to and from the instrumented system. By using standard tools like ProcMon it has less custom code to maintain, but more components, like a FTP server for supporting file transfers to and from the instrumented system. Another cool feature is the graphical viewer ProcDOT that combines the ProcMon output with the TCPDump traffic to visualize a timeline of events.   Both Minibis and ProcDOT is available from the CERT dot AT website.
  17. Indicators of Compromise, or IOCs for short, are ways to detect if a system has been compromised by looking for specific patterns in files, created files and mutexes, created or modified registry keys on a system. On the network we can look at specific patterns for the command and control traffic or we can search for patterns in the system memory. A mutex, short for mutual exclusion object, is a program object that allows multiple program threads to share the same resource, such as file access, but not simultaneously.   From easy to hard I recommend you approach the IOC identification in this order: Files, mutexes and registry keys followed by network analysis and finally memory dumps.
  18. YARA is the Swish army knife of binary pattern matching. It understands both binary and printable patterns, ASCII and Unicode aware and you can ask it to match patterns a specific distance or range from another pattern. I would need another hour just to tell you all the cool features with YARA but here’s a quick example. First we have a rule name (“silent_banker”) and a tag (“banker”). If you are collecting malware like me you sooner or later end up with a large collection of samples and it is nice to keep track of what kind of malware they are. Then we have some metadata, like a human readable description of what it is looking for, and some other metadata. You can write pretty much anything here you want to be able to find in the output later on. In the “strings” section we are specifying what patterns we are looking for. Here you see that we are using variables and $A and $B is using hex to specify the pattern, while $C is using ASCII. Finally we specify under what conditions this rule should trigger, and in this example all of the patterns are required to trigger a match.
  19. For SNORT rules it would look something like this if we were looking for the same patterns in the network traffic. First we specify that we want an alert for the match and the network protocol, in this example we are looking at TCP traffic, then we specify the source network followed by the source port. After the direction arrow we specify destination host or network and the port number. The content tag is specifying that it is content we are looking for, because you can also look at other aspects of the network traffic like flags, time to live etc. Again we are specifying the strings in both HEX and ASCII format and finally the message – the name that will be displayed when the alert triggers – using the MSG tag. Instead of specifying the known C2 server we just match the traffic pattern so we detect C2 traffic to C2 servers that we don’t yet know about. It is much easier for an attacker to change hostnames or IPs of C2 servers than it is to re-engineer the C2 protocol itself.
  20. Using existing network infrastucture we can detect additional infections. The firewall can be used to detect C2 traffic based on IP address and port number, and block the communication. The IDS or IPS can be used to detect C2 communication on a protocol level as well as known binary downloads, and in the case of IPS can be used to block the traffic. The proxy can be used to detect infections as well as block access to malware-infested sites and C2 servers. DNS can be used to detect infections and by blackhole-routing known malicious hosts by either redirecting them to localhost but even better to redirect the traffic to a server with extra logging enabled to single out additional infected machines. A quick way to achive this is to use INetSim, the Internet Simulator.
  21. In conclusion, your network has more capabilities to locate “bad stuff” then you know or making use of. You don’t need to spend tens of thousands on software and hardware, you can get a lot from what you already have by using the capabilities you already paid for and looking at the output from the systems. Of course there are many solutions on the market that puts it all together in a easy to use, usually web based, interface and if you can I would recommend you to look at some of the solutions but it is not a requirement. All the tools I have spoken about today are either free – as in beer - or very cheap. I would say that you wasting your organization’s resources by not employing the techniques discussed here today. If you have any questions you can ask them now or catch me afterwards, or you can drop me an email at michael AT michael boman DOT org, stalk me on twitter where I am AT mboman. I also recommend you to visit the Malware Research Institute website at blog DOT malware research DOT institute where you can find more information on how to search and destroy malware.