CMSC 491/691 Malware Analysis

Slides:



Advertisements
Similar presentations
Thank you to IT Training at Indiana University Computer Malware.
Advertisements

ISRT IS 376 OCTOBER 28, 2014 INTERNET SECURITY THREAT REPORT  2014.
By Hiranmayi Pai Neeraj Jain
Lecture 13 Malicious Software modified from slides of Lawrie Brown.
Dr. John P. Abraham Professor UTPA 2 – Systems Threats and Risks.
CHAPTER 2 KNOW YOUR VILLAINS. Who writes it: Malware writers vary in age, income level, location, social/peer interaction, education level, likes, dislikes.
Chapter 14 Computer Security Threats Patricia Roy Manatee Community College, Venice, FL ©2008, Prentice Hall Operating Systems: Internals and Design Principles,
CS Nathan Digangi.  Secret, undocumented routine embedded within a useful program  Execution of the program results in execution of secret code.
Malicious Attacks. Introduction Commonly referred to as: malicious software/ “malware”, computer viruses Designed to enter computers without the owner’s.
What Are Malicious Attacks? Malicious Attacks are any intentional attempts that can compromise the state of your computer. Including but not limited to:
Guide to Operating System Security Chapter 2 Viruses, Worms, and Malicious Software.
Advanced Persistent Threats CS461/ECE422 Spring 2012.
Trojan Horse Implementation and Prevention By Pallavi Dharmadhikari Sirisha Bollineni VijayaLakshmi Jothiram Vasanthi Madala.
Tyler’s Malware Jeopardy $100 VirusWormSpyware Trojan Horses Ransomware /Rootkits $200 $300 $400 $500 $400 $300 $200 $100 $500 $400 $300 $200 $100 $500.
1 Chap 10 Malicious Software. 2 Viruses and ”Malicious Programs ” Computer “Viruses” and related programs have the ability to replicate themselves on.
Unit 2 - Hardware Computer Security.
APT29 HAMMERTOSS Jayakrishnan M.
Malware  Viruses  Virus  Worms  Trojan Horses  Spyware –Keystroke Loggers  Adware.
CHAPTER 14 Viruses, Trojan Horses and Worms. INTRODUCTION Viruses, Trojan Horses and worm are malicious programs that can cause damage to information.
1 Higher Computing Topic 8: Supporting Software Updated
1 Chap 10 Virus. 2 Viruses and ”Malicious Programs ” Computer “Viruses” and related programs have the ability to replicate themselves on an ever increasing.
Virus Detection Mechanisms Final Year Project by Chaitanya kumar CH K.S. Karthik.
Trojan Virus By Forbes and Mark. What is a Trojan virus Trojans are malicious programs that perform actions that have not been authorised by the user.
Week 10-11c Attacks and Malware III. Remote Control Facility distinguishes a bot from a worm distinguishes a bot from a worm worm propagates itself and.
Understanding Computer Viruses: What They Can Do, Why People Write Them and How to Defend Against Them Computer Hardware and Software Maintenance.
Topic 5: Basic Security.
Malicious Software.
Computer Skills and Applications Computer Security.
Computer virus Speaker : 蔡尚倫.  Introduction  Infection target  Infection techniques Outline.
Computer Security Threats CLICKTECHSOLUTION.COM. Computer Security Confidentiality –Data confidentiality –Privacy Integrity –Data integrity –System integrity.
Computer virus Done: Aaesha Mohammed ID: H
MALICIOUS SOFTWARE Rishu sihotra TE Computer
Page 1 Viruses. Page 2 What Is a Virus A virus is basically a computer program that has been written to perform a specific set of tasks. Unfortunately,
Virus Infections By: Lindsay Bowser. Introduction b What is a “virus”? b Brief history of viruses b Different types of infections b How they spread b.
MUHAMMAD GHAZI AIMAN BIN MOHD AIDI. DEFINITION  A computer virus is a malware program that, when executed, replicates by inserting copies of itself (possibly.
Detected by, M.Nitin kumar ( ) Sagar kumar sahu ( )
By Thomas Pantone Cosc 380.  A virus is a type of malware that self replicates after being executed and inserts itself into other programs, data files,
R ANSOMWARE CAN ORIGINATE FROM A MALICIOUS WEBSITE THAT EXPLOITS A KNOWN VULNERABILITY, PHISHING CAMPAIGNS,
Created by the E-PoliceSlide 122 February, 2012 Dangers of s By Michael Kuc.
Internet Vulnerabilities & Criminal Activity Internet Forensics 12.1 April 26, 2010 Internet Forensics 12.1 April 26, 2010.
Computer safety Filip Hruby.
WannaCry/WannaCrypt Ransomware
Botnets A collection of compromised machines
WannaCry/WannaCrypt Ransomware
CS3235: Introduction to Computer Security
What they are and how to protect against them
Ilija Jovičić Sophos Consultant.
Three Things About Malware
3.6 Fundamentals of cyber security
Various Types of Malware
Malware Reverse Engineering Process
Viruses and Other Malicious Content
Techniques, Tools, and Research Issues
Phishing is a form of social engineering that attempts to steal sensitive information.
Malware, Anti-malware & Rats
Botnets A collection of compromised machines
NET 311 Information Security
Computer Applications Unit B
WHAT IS A VIRUS? A Computer Virus is a computer program that can copy itself and infect a computer A Computer Virus is a computer program that can copy.
Risk of the Internet At Home
Intercept X for Server Early Access Program Sophos Tester
– Communication Technology in a Changing World
Chap 10 Malicious Software.
UNIT 18 Data Security 1.
Malware CJ
Faculty of Science IT Department By Raz Dara MA.
Chap 10 Malicious Software.
How to keep the bad guys out and your data safe
Crisis and Aftermath Morris worm.
Basic Dynamic Analysis VMs and Sandboxes
Presentation transcript:

CMSC 491/691 Malware Analysis Intro to Malware Analysis

Topics Malware detection, classification, attribution Categories of Malware Types of Malware Analysis

Malware Detection, Classification, and Attribution

Malware Detection Is a given file benign or malicious? Malicious indicator Trait of a file that suggests it may not be benign

Malware Classification Given a malware sample, what category does it belong to? Will discuss some broad categories of malware soon What family does the malware sample belong to? Will also talk about some notable families

Malware Attribution Who is responsible for a cyberattack? Need to consider IOCs and TTPs when doing attribution Indicators of Compromise Tools, Techniques, and Procedures

Indicators of Compromise (IOCs) Evidence left by cyberattack Examples: Malware samples Infrastructure IP addresses Domain names Email addresses

Tools, Techniques, Procedures (TTPs) Usual behavior / methods used by a threat actor Some examples of TTPs: Who does the threat actor usually target? What infection vector does the threat actor normally use? What are the goals of the threat actor?

Categories of Malware

Worm Replicates itself and spreads automatically over a network Attempt to infect as many computers as possible Usually exploits a vulnerability to do so

Trojan (Trojan Horse) Malicious program that appears to have a useful function Often spread by social engineering Email attachments Clicking on malicious links/ads Payloads can be a variety of things, including backdoors, ransomware, etc.

Worm Example: Conficker Exploits the MS08-067 vulnerability Vulnerability was patched before the worm came out Still propagating a decade later Mostly on unpatched legacy systems Estimated 9 to 15 million computers infected since 2008 The authors of the worm still have not been identified

File Infector Also commonly called a virus Not all malware is a virus! Inserts its own code into executable files to persist and spread When the infected executable is run, the virus also executes Can spread if the infected executable is copied onto another system and run

Backdoor Allows a threat actor to remotely access infected computer, bypassing authentication

Remote Access Tool/Trojan (RAT) Gives actor remote access to, and a high level of control over, the infected computer Example of RAT: Poison Ivy, which can log keystrokes, spy on the victim’s actions, steal password hashes, transfer files, etc. Since 2008, many different APT groups have used Poison Ivy variants in their campaigns Very popular tool, simple to use Information from https://www.fireeye.com/content/dam/fireeye-www/global/en/current-threats/pdfs/rpt-poison-ivy.pdf

RAT Example: Poison Ivy Screenshot of Poison Ivy use, showing victim’s screen within the GUI framework Image from http://www.primalsecurity.net/poison-ivy-remote-access-tool-rat/

Botnet Refers to a large number of computers being controlled simultaneously by a single actor Anywhere from a few thousand to a few million Often used to send spam emails and launch DDoS attacks Differs from RAT, where the actor has fine control of a machine With a botnet, the actor can give commands to many machines Different desired outcomes, different means of achieving them

Credential Stealer Attempts to steal the victim’s credentials Usually done using keylogging or by dumping password hashes

Banking Trojan Trojan that listens for banking login credentials Most famous example: Zeus, which triggered when certain URLs were visited, and inserted JavaScript code into a legitimate bank’s website pages Estimate of over $100 million in losses/damages since 2007 Source code was leaked in 2011 Other malware authors used this leaked code to create dozens of variants that are still active today Information taken from https://www.trendmicro.com/vinfo/us/security/news/cybercrime-and-digital-threats/online-banking-trojan-brief-history-of-notable-online-banking-trojans

Ransomware Encrypts data and demands payment to decrypt victim’s files Often asks for payment in cryptocurrency Causes billions of dollars in losses/damages each year Quicker and more direct method of making money than banking trojans Don’t have to wait for a user to log into their account

Ransomware Example: CryptoLocker One of the earliest successful ransomware families, popularized ransomware Infected over 250,000 computers and earned over $3 million in 2013

Cryptojacker (Cryptocurrency Miner) Silently mines cryptocurrency for cybercriminals Current cybercriminal favorite as of late 2017 Much stealthier and does not require the victim to do anything

Rootkit Maintains covert access to infected system Actively masks its existence Two types: user mode and kernel mode User mode runs at same level as other user applications e.g., Intercepts calls to APIs to prevent listing its files in a directory Kernel mode runs with the highest privileges e.g., Adds or replaces portions of the OS itself

Destructive Malware Makes the infected system unusable Often by disk wiping Recent example: NotPetya Originally classified as a ransomware worm that spread by exploiting EternalBlue in 2017 Seemed to be a variant of the Petya ransomware Encrypts parts of the master boot record and intentionally makes system unrecoverable, even if the ransom is paid Now classified as destructive malware / worm

Wiper Example: NotPetya Heavily targeted computers in Ukraine, caused over $10 billion in damages One of the costliest, if not the costliest cyberattack to date Attributed to the Sandworm APT group, which is Russian state-sponsored Image from https://www.theregister.co.uk/2017/06/28/petya_notpetya_ransomware/

Types of Malware Analysis

Basic Static Analysis Examining the malware while it is “at rest” Strings Imports Metadata

Basic Dynamic Analysis Observing the output and/or changes when the malware is run But not interfering or interacting with the malware How it interacts with: Filesystem Network Registry

Advanced Static Analysis Analyzing the malware sample’s code to understand what it does Done using a disassembler

Advanced Dynamic Analysis Using a debugger to observe / control the malware as it executes Registers Stack Memory Code