Malware Analysis Summary

Unit 10 - Tools and Techniques

Last Update Unknown

Malware Analysis Summary

First Steps

  • Don't just start disassembling the code or running malware in debugger.
  • First Review the data you already have
    • Mine logs, alerts and package captures that have already been generated by the malware
    • More accurate but less samples.
  • Live-captured information provides more transparent view of malicious applications true behaviour.
  • Real traffic provides information about the malware at both end points (client and server).
  • Analysing what we already have is safer

Countermeasures

  • Understand how the malware uses the network
    • IP addresses
    • TCP and UDP ports
    • Domain names
    • Traffic content
  • Mitigation (network based)
    • Firewalls and routers can be used to restrict access to a network based on IP address or ports
    • DNS servers can be configured to reroute known malicious domains to an internal host (sinkhole)
    • Proxy Servers can be configured to detect or prevent access to a specific domain.
  • Mitigation (content based)
    • Intrusion Detect Systems
    • Intrusion Prevention Systems
    • Email proxy
    • Web proxy
  • Technologies can be deployed to employ content-based countermeasures.

Network Countermeasures

  • Mitigation (content based)
    • Create a signature
    • Check uniqueness (run over real traffic to verify no false positives)
  • When writing signatures, it is important to identify variable elements of the targeted content so that they are not mistakenly included in the signature.
  • Make signature as complete as possible
    • More likely to catch different versions of the Malware

Other Dangers

  • Targeted malware may provide the attacker information when being analysed
    • Spear-phishing email with a link specific to the target/li>
    • Encoded link within the malware/li>
    • Embed a custom domain
  • These might alert the attacker
  • Protection
    • Tor
    • Dedicated connection

Hiding Techniques

  • Mimic existing protocols
    • IRC, HTTP, HTTPS and DNS
  • Using existing infrastructure
    • Servers dedicated solely to Malware are easier to find
  • Client beaconing
    • NAT

Detecting Virtual Machines

  • Most home users don't use virtual machines so some malware attempts to detect virtual environment to make sure that it is attacking a home user.
  • Popularity of anti-virtualisation techniques is going down because of the increased use of virtualisation.