Justin Brady Malware Forensics.

Slides:



Advertisements
Similar presentations
Tips and tools to keep you and your information safe on-line. We will go over a lot of information today, so it is important to pay attention and follow.
Advertisements

Thank you to IT Training at Indiana University Computer Malware.
SECURITY CHECK Protecting Your System and Yourself Source:
Safe IT – Protect your computer and Family from unwanted programs viruses and websites.
Presented by: Luke Speed Computer Security. Why is computer security important! Intruders hack into computers to steal personal information that the user.
Title: The Internet LO: Security risks. Security risks Types of risks: 1.Phishing 2.Pharming 3.Spamming 4.Spyware 5.Cookies 6.Virus.
INTERNET SAFETY FOR STUDENTS
Threats to I.T Internet security By Cameron Mundy.
Internet safety By Lydia Snowden.
Trojan Horse Implementation and Prevention By Pallavi Dharmadhikari Sirisha Bollineni VijayaLakshmi Jothiram Vasanthi Madala.
Viruses & Security Threats Unit 1 – Understanding Computer Systems JMW 2012.
The Blue “W” is placed on your Desktop or in your system tray area.
CS101 Lecture 14 Security. Network = Security Risks The majority of the bad things that can be done deliberately to you or your computer happen when you.
Malware  Viruses  Virus  Worms  Trojan Horses  Spyware –Keystroke Loggers  Adware.
IT Security for Users By Matthew Moody.
Staying Safe Online Keep your Information Secure.
Windows Vista Security Center Chapter 5(WV): Protecting Your Computer 9/17/20151Instructor: Shilpa Phanse.
Threat to I.T Security By Otis Powers. Hacking Hacking is a big threat to society because it could expose secrets of the I.T industry that perhaps should.
CHAPTER 14 Viruses, Trojan Horses and Worms. INTRODUCTION Viruses, Trojan Horses and worm are malicious programs that can cause damage to information.
A computer virus is a computer program that can replicate itself and spread from one computer to another. The term "virus" is also commonly, but erroneously.
Network problems Last week, we talked about 3 disadvantages of networks. What are they?
Virus and anti virus. Intro too anti virus Microsoft Anti-Virus (MSAV) was an antivirus program introduced by Microsoft for its MS-DOS operating system.
What is a Virus? A computer virus is like a little program that can copy and paste itself onto other computers and infect them, getting rid of documents.
Computer security By Isabelle Cooper.
DEFINING A VIRUS By saad. Defining a virus A virus is a piece of code or program. A virus is loaded onto the computer and runs without your command All.
What is hacking? Hacking is the use of a computer and its files with out being allowed by the owner. Hacking is used to find out peoples passwords and.
Chapter 12: How Private are Web Interactions?. Why we care? How much of your personal info was released to the Internet each time you view a Web page?
Computer Skills and Applications Computer Security.
Computer Security By Duncan Hall.
Virus Assignment JESS D. How viruses affect people and businesses  What is a virus? A computer virus is a code or a program that is loaded onto your.
Introduction: Introduction: As technology advances, we have cheaper and easier ways to stay connected to the world around us. We are able to order almost.
By: Jasmin Smith  ability to control what information one reveals about one’s self over the Internet.
How to Make Yourself More Secure Using Public Computers and Free Public Wi-Fi.
Travis DeBona COSC  What is Malicious Code  Types of Malicious Code  Who’s Behind It  How To Secure My Computer.
Common System Exploits Tom Chothia Computer Security, Lecture 17.
Avast Mail Scanner When we talk about antivirus, Avast has never disappointed us. With the inclusions of latest features all the time, it is able to.
bitdefender virus protection
Technical Implementation: Security Risks
Computer safety Filip Hruby.
Chapter 40 Internet Security.
Digital Security Identity theft Copyright Laws Plagiarism, and More.
Managing Windows Security
Three steps to prevent Malware infection
What they are and how to protect against them
Malware and Computer Maintenance
Hotspot Shield Protect Your Online Identity
Unit 4 IT Security.
Backdoor Attacks.
Lecture 8. Cyber Security, Ethics and Trust
Homeland Security: Computer Protection
Cyber Security By: Pratik Gandhi.
How to Install and Setup Quick Heal Antivirus Call
A Trojan is a computer program that contains the malicious code and it misleads users and user's computer. It aims to designed to perform something is.
Done BY: Zainab Sulaiman AL-Mandhari Under Supervisor: Dr.Tarek
Call AVG Antivirus Support | Fix Your PC
Virus And Malware Causes And Troubleshoot By I FIX PC
Trend Micro Antivirus + Security To Buy Visit : Or Contact : (855)
Scams, Identity Theft, and Viruses Kelly & Caitlin
Internet Safety for Everyone
Information Security Session October 24, 2005
HOW DO I KEEP MY COMPUTER SAFE?
Encryption and Hacking
Computer Security.
Bethesda Cybersecurity Club
Unit 4 IT Security Kerris Davies.
Internet Safety for Everyone
Internet Safety for Everyone
Internet Safety for Everyone
6. Application Software Security

Presentation transcript:

Justin Brady Malware Forensics

Intro Malware Forensics I chose this because I always have loved finding out how Malware works MotherBoard We do a lot of elemination of Malware but no reasearch on the types This job is always very rewarding but eaves me with a lot of different questions still! So what does this different malware do? Where is it hiding at exactly?

Setup for the Release The malware was set up and released on a VM. I used VirtualBox to run the VM on a non personal computer. This was to ensure that none of my personal data would be at risk or that any info would be stolen I made sure that it was non networked. Also there was no file sharing between the VM and host system. The VM was a windows 10 image. This is what people everywhere will be and are using. Note taking and screenshots like for court

First look I decided to start with the filesystem and see what was to be found. There were a couple of things already on the desktop Bombermania, things that look harmless Downloads There was a lot in downloads This is where Malware would usually start its journey. Most of the files were .exe’s or zipped files One I notices was called win32.peals Later found this to be a common name for some trojans

Windows Defender Next I decided to use the built in system tool to do some more analysis. I tried some different scans and it looked like they didn’t find anything I tried a couple of different scans and techniques Opened some of the files Upon further inspection we can see it did find a good amount of things.

The history Tab There is a record kept of all detected items and a description panel Six different items They had been quarantined I made sure I allowed them all so that I could keep on doing analysis.

PWS:Win32/Zbot!GO I looked into them all and decided to focus on this one particularly. PWS:Win32/Zbot!Go Is a password stealer. it comes from a family program called Win32/Zbot Zeus Wsnpoem or Citadel Win32- The name makes it seem safe. Win is a common denotation for windows liscenced system files that is on all windows operating systems Also 32 or the system 32 folder is a name for one of the folders that is on windows as a core program.

PWS:Win32/Zbot!GO I found out that Win32/Zbot is actually a trojan this specific trojan focuses on is stealing financial information from the user Passwords Logins It can start by lowering your firewall and internet browser security then this malware can give a malicious hacker access to your computer directly. It does it all!

-The filesystem where the password stealer is located. Note that it is located in AppData/Roaming. This file location is actually hidden to the normal user .

PWS:Win32/Zbot!GO How it works tecnically Sits and monitors when a user goes to an online banking address It finds an API and latches onto it Once attached the virus then injects code into the webpages Information is then stolen Passwords, User ID’s ect

Test Files I was very curious as to what these were. It turns out these are indeed not malware at all. It is a file that would be downloaded to check if your security is up to par. X5O!P%@AP[4\PZX54(P^)7CC)7}$ EICAR-STANDARD-ANTIVIRUS- TEST-FILE!$H+H*

Prevention have a high quality security program running at all times have your firewall always up never opened any unknown email attachment do not download or run anything suspicious from websites that you do not frequent In other words, there are no special ways to defend against a password stealer versus a PUP. You can get both just as easily You need all of these comprehensive security measures in place if you want to have a secure and safe computing experience.