55
Malware 101 Malware 101 “Basics” Berman Enconado

Malware 101 “Basics” Berman Enconado. Malware 101 Malware is malicious software How to identify? Stealing information Unauthorized access Exploits Fooling

Embed Size (px)

Citation preview

Malware 101

Malware 101

“Basics”Berman Enconado

Jovi Umawing
Please update the slide with the new GFI Software template :)

Malware 101

Malware is malicious software

How to identify?• Stealing information• Unauthorized access• Exploits• Fooling the unsuspecting user

Malware 101

en.wikipedia.org/wiki/Malware

Jovi Umawing
How about APTs? Where do we classify them?^ Just a possible question that I thought the audience would ask ;)

Malware 101

Classification of Malware

Malware GoodwareGrayware

Malware 101Viruses

File Header

Host Code

Entry Point

File Header

Host Code

Virus Code

Entry Point

File Header

Host Code

Virus CodeEntry Point

Uninfected Host

Virus Code Insertion

Infected Host

(Header Updated)

Malware 101

Exploited WinAmp Playlist (m3u file)

Exploits

Malware 101

Attacker

Network/I nternet

Server Compone

ntClient Component

Victim

Trojan / Backdoor

Malware 101

• Dropped files– Usually in %windows% or %system% directories

• Autostart– HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run

– HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\RunOnce

– HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\ Windows NT\CurrentVersion\Winlogon

– %USERPROFILE%\Start Menu\Programs\Startup

Trojan / Backdoor

Malware 101Rootkit

Malware 101

The famous “Love Bug” aka ”I love

you” worm. Not a virus but a worm.

(Filipino-made)

Worms

Malware 101

Theories for self-replicating programs are created

First Apple virus found “in the wild”

- Spreads through pirated games

Macro Virus

Java infectors

Chernobyl

Polymorphic Virus

-Annoying and destructive viruses starts to became rampant

ILoveYou “virus”

Sends via email

Melissa

-Email spammer

- uses MS Word documents

Conficker Worm

- Most number of computers infected since Slammer in 2003

Slammer Worm

- fastest spreading worm to date; infecting 75,000 computers in approximately ten minutes

TDL

Stuxnet

Rustock

Rootkits

Mobile

Brief History of Malware

Malware 101

A malware installs itself in the system without any notification or dialogs

A legit application gets installed by a setup with a sequence of notifications

or dialogs

Malware Researcher Notes

Jovi Umawing
Are these the ways or just notes related to this section?

Malware 101

Tools anyone can use to determine system infection.

Malware 101

Process Explorer

Malware 101

Installrite

Malware 101

Wireshark

4sysops.com

Malware 101

Autoruns

Malware 101

GMER

Lavasoft.com

Malware 101

Malware 101

“Clean-up”Reginald Wong

Jovi Umawing
Is this section for regular users? Based from the succeeding slides, it's for GFI engineers since you mention "customer"....

Malware 101Installation Setup

Legit App Malware

Installs using a dialog No dialog. May show fake error or image such as porn

Usually installs its components in Program Files folder

Usually installs itself in the Windows folder(s)

Can be manually run from Start Programs Menu

It is already running and triggered at a system event such as startup.

versus

Malware 101Comparison: Process

Before After

Malware 101Comparison: File

Before After

Malware 101Comparison: Registry

Before

After

Malware 101Comparison: Registry

Before

After

Malware 101Comparison: Registry

Before

After

Malware 101

Malware 101

Assuming we do not have any third-party tools, and we only have our plain old

Windows NT-based OS….

Malware 101Common Malware File Locations

• Located in – Windows folder or subfolders like System32.

i.e. C:\Windows\System32– Recycle(r) folders– Desktop

• And can be found set to run at startup

Malware 101Looking for Suspicious Files

Click on Start->RunThen type, MSCONFIGAnd hit ENTER

Malware 101Looking for Suspicious Files

Click on Start->RunThen type, TASKMGRAnd hit ENTEROrPress CTRL-SHIFT-ESC

Malware 101Suspicious Files: File Properties

• Version Information– Google is your very best friend

• File version• Company Name• Copyright

• Icon– Trying to mimic a folder, explorer, or any legit

application. Check out the path.– No icon

Malware 101Suspicious Files: File Properties

Malware 101Suspicious Files: File Properties

Malware 101Looking for Suspicious Files

Malware 101Looking for Suspicious Files

Malware 101Looking for Suspicious Files

Still not showing up?!?

Malware 101Looking for Suspicious Files

Unhide using ATTRIB (command line app)

Malware 101Looking for Suspicious Files

Malware 101Looking for Suspicious Files

Malware 101Removal: Attempt to Delete File

Malware 101Removal: Attempt to Terminate Process

Unfortunately Fails to Terminate

Malware 101Removal: Attempt to Delete File

HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Session Manager

Click on Start->RunType REGEDITHit ENTER

Malware 101Removal: Attempt to Delete File

Malware 101Removal: Attempt to Delete File

Malware 101Removal: Attempt to Delete File

Pad 2 0x00 bytes which means Renaming the file to nothing. In other words, delete.

Malware 101Removal: Attempt to Delete File

Malware 101Removal: Attempt to Delete File

Malware 101Removal: Attempt to Delete File

Verify that the file was

deleted. Do the same

process when looking for the malware file.

Malware 101Removal: Attempt to Delete File

Also check that the

malware file is not in the process list.

Malware 101Removal

Jovi Umawing
I...don't understand :D

Malware 101Removal: Clean up Remnants

Malware 101Removal: Clean up Remnants

Click on Start->RunType REGEDITThen hit ENTER

Click on “My Computer”Click on Edit->Find/SearchIn the search box, type the name of the malware file then click on Find

Malware 101Removal: Clean up Remnants

Malware 101Warning!

Do NOT delete registry entries that contains the malware file name.

Do NOT delete file names similar to that of the malware file name. It could have mimicked a

system file name.

Research about it first. If you think handling the malware is still difficult, send the file to your favorite

Antivirus vendor.

Jovi Umawing
You might want to edit out the part "Get help from your seniors or from the AVLabs team."

https://www.facebook.com/gfisoftwarehttps://www.facebook.com/GFILabsPH

https://twitter.com/gfisoftwarehttps://twitter.com/gfilabsph

Jovi Umawing
This is the "Thank You!" pageYou may want to put up the official social networking channels of GFI Software:https://www.facebook.com/gfisoftwarehttps://www.facebook.com/GFILabsPHhttps://twitter.com/gfisoftwarehttps://twitter.com/gfilabsphFeel free to also plug your own Twitter accounts if you have them :)