11
Dissecting the Hack Malware Analysis 101 Sunday, September 19, 2010

Dissecting the Hack: Malware Analysis 101

Embed Size (px)

DESCRIPTION

Dissecting the Hack: Malware Analysis 101 is designed to be an introduction into the world of malware analysis. This presentation will begin with a brief 5 to 10 minute introduction to some malware analysis theory, followed by a live demonstration that will take the audience through an in-depth behavioral and code analysis of a select piece of malware. This demonstration will include techniques using free open source tools such as detecting packers and unpacking, file and registry analysis, and in depth code analysis. Gerry Brunnelle, System Security Engineer, Boeing Gerry Brunelle is currently a System Security Engineer for Boeing in the Washington, D.C. area. He is also currently a candidate for a MS in Computer Security and Information Assurance from RIT and has a BS in Network and System Administration from RIT. He has participated in various security groups and competitions, and designed and ran the Capture the Flag event for the Rochester Security Summit in 2009.

Citation preview

Page 1: Dissecting the Hack: Malware Analysis 101

Dissecting the HackMalware Analysis 101

Sunday, September 19, 2010

Page 2: Dissecting the Hack: Malware Analysis 101

Who am I?

Gerry Brunelle

System Security Engineer for Boeing

Sunday, September 19, 2010

Page 3: Dissecting the Hack: Malware Analysis 101

What were covering

Malware 101

Analysis 101

evil.exe

Sunday, September 19, 2010

Page 4: Dissecting the Hack: Malware Analysis 101

Malware 101

So..what is malware?

A piece of software that accesses a computer secretly without the owners consent

Some types are viruses, rootkits, and trojans

Are designed to do almost anything

Sunday, September 19, 2010

Page 5: Dissecting the Hack: Malware Analysis 101

Malware 101

How does malware affect you?

Steals information from your systems

Compromises integrity of you data

Cripples networks

Sunday, September 19, 2010

Page 6: Dissecting the Hack: Malware Analysis 101

Analysis 101

2 Types

Behavioral analysis

Code analysis

Sunday, September 19, 2010

Page 7: Dissecting the Hack: Malware Analysis 101

Analysis 101

Behavioral analysis

What the malware does

File creation/modification

Network activity

Registry activity

Sunday, September 19, 2010

Page 8: Dissecting the Hack: Malware Analysis 101

Analysis 101

Code analysis

What you can’t observe

Code characteristics

Packing/unpacking

Embedded information

Sunday, September 19, 2010

Page 9: Dissecting the Hack: Malware Analysis 101

Our scenario

User calls stating their machine is slow

Escalated to L2 support for on-site

On-site tech observes odd behavior

evil.exe running

Connected to port 1337 somewhere

Tech refers case to Security Operations Center

Sunday, September 19, 2010

Page 10: Dissecting the Hack: Malware Analysis 101

Our Scenario

SOC CIRT Team mobilized

They are now observing multiple infections

Estimated infections at ~1000

Traffic is now crippling traffic at the border

Have received evil.exe for analysis

Sunday, September 19, 2010

Page 11: Dissecting the Hack: Malware Analysis 101

Our scenario

Time to do some hacking...

Sunday, September 19, 2010