Malware - Cal Poly SWIFT
Download
Report
Transcript Malware - Cal Poly SWIFT
Why you should never use the internet
Overview
The Situation
Infiltration
Characteristics
Techniques
Detection
Prevention
The Situation: Shit Just Got Real
The players and the game has changed
Criminal organizations*
Governments**
Profit/Politically driven
Cyber weapons
FBI vs Coreflood
Professionally developed
User manuals
MaaS
*may or may not be organized
** may or may not be criminals
Infiltration
Legitimate (compromised) hosts
Direct: Wordpress hacked
Indirect: Advertisements
Exploit Packs
Search Engine Optimization hacks
Breaking news
Celebrities (Snookie causes infections)
Social
Facebook, Twitter, etc
Characteristics (the lines have blurred)
Virus
Trojan/Backdoor
Rootkit
Scam/Scareware/Randsomware
Password stealers
Worms
Techniques
API Hooking
Run-time Patching
Boot sector modification
Browser Content replacement
API Hooking
Allows malware to intercept Windows
API calls
Can be done in user or kernel space,
but in kernel space it’s much more
powerful
API Hooking
Program
DeleteFile[A|W]
NtDeleteFile
USER MODE
KERNEL MODE
System Service Descriptor Table
SSDT
ZwDeleteFile
API Hooking: Example
Program
DeleteFile[A|W]
NtDeleteFile
USER MODE
KERNEL MODE
System Service Descriptor Table
SSDT
fakeDelete
ZwDeleteFile
API Hooking
Allows rootkits to do a lot of nasty things
Hide processes/files
Hide networking (to a degree)
Basically take over your system
Fairly straightforward to implement
However, it is easy to detect
Run-time Patching
Replaces API calls with your own by
patching the API routine itself
Can achieve the same goals as API
hooking, but harder to detect
Run-time Patching: Example
Target Code
Run-time Patching: Example
Jump Back
Target Code
Detour Jump
Malicious Code
Run-time Patching
Very tricky to implement
Harder to detect
You have to scan the memory space
If it’s not permanent, an offline analysis isn’t
very helpful
Boot Sector Modification
Changes boot sector code to load an
alternative boot loader
This boot loader can change the way
Windows boots, including disabling
checks and protections
Can be difficult to remove (and detect)
Browser Content Replacement
Allows the malware to modify what you
see and send in your web browser
Can replace forms, POST data, POST
locations, hide data…
“View Source” does nothing:
modifications are done in memory
HTTPS is not relevant
Browser Content Replacement:
Zeus botnet
From the user manual:
“Intercepting HTTP/HTTPS-requests from wininet.dll
(Internet Explorer, Maxton, etc.), nspr4.dll (Mozilla
Firefox) libraries:
1.
2.
3.
4.
5.
6.
7.
8.
9.
Modification of the loaded pages content (HTTP-inject).
Transparent pages redirect (HTTP-fake).
Getting out of the page content the right pieces of data (for
example the bank account balance).
Temporary blocking HTTP-injects and HTTP-fakes.
Temporary blocking access to a certain URL.
Blocking logging requests for specific URL.
Forcing logging of all GET requests for specific URL.
Creating a snapshot of the screen around the mouse cursor
during the click of buttons.
Getting session cookies and blocking user access to specific
URL.”
Detection
AV (loosing race)
Monitor outbound communications
TCPView
Netstat
Border monitoring
Outbound watching IDS (snort)
System Internals
TCPView
Procmon
RootKitRevealer
Detection: GMER
Rootkit detector
Detects:
Hidden processes, hidden files, hidden
DLLs, hidden registry keys, hidden*
SSDT, IAT, EAT hooks
MBR modification
Suspicious drivers
…lots more
Detection: GMER
Prevention
Update software (not just Windows)
Windows 7 (x64)
EMET
Uninstall Adobe Reader
Chrome/Firefox
VMs/Linux/OSX
Further Information
Blogs
F-secure: http://www.f-secure.com/weblog/
Sophos: http://nakedsecurity.sophos.com/
Inreverse: http://www.inreverse.net/
Online tools
Virus Total: http://www.virustotal.com/
Anubis: http://anubis.iseclab.org/
Samples:
Malware domain list:
http://www.malwaredomainlist.com/
Offensive Security:
http://www.offensivecomputing.net/
LayerOne
Hacker con at the Anaheim Marriott
May 28-29
Hardware Hacking, Lockpicking,
Contests
$100 online, $140 at the door
References
2010 Websense Threat Report: http://www.websense.com/content/threatreport-2010-introduction.aspx?cmpid=prblog
Verizon 2011 Data Breach Investigations Report:
http://www.verizonbusiness.com/resources/reports/rp_data-breachinvestigations-report2011_en_xg.pdf?&src=/worldwide/resources/index.xml&id=
Microsoft Security Intelligence Report v10:
http://www.microsoft.com/security/sir/
Book: “The Rootkit Arsenal”, by Reverend Bill Blunden
Book: “Malware Analyst’s Cookbook”, by M. Ligh, S. Adair, B. Hartstein, M.
Richard
Book: “Reversing: Secrets of Reverse Engineering”, by Eldad Eilam
MSDN Documentation: http://msdn.microsoft.com/en-us/library/default.aspx
Questions?
[email protected]