1.
0
Introduction To Malware Analysis
Incident Response- Case history
A medical clinic with
Hired a consultant to All done—
10 offices found
clean & re-image
malware on one of
that machine case closed?
their workstations
Incident Response
Did an attacker
After malware is implant a What did the
Is the attacker How did the Root-cause
found, you rootkit or trojan attacker steal or
really gone? attack get in analysis
need to know on your add?
systems?
Malware Analysis
Dissecting
A critical part of
malware to
incident response
understand
How it works
How to
identify it
How to
defeat or
eliminate it
The Goals of Malware Analysis
Ensure you’ve
located all
Exactly what
infected
happened
machines and
Information required to files
respond to a network intrusion
Find
How to
signatures for
measure and
intrusion
contain the
detection
damage
systems
1.1 Describe term of Malware
Malware is a code that performs malicious actions; it
can take the form of an executable, script, code, or
any other software.
Attackers use malware to steal sensitive information,
spy on the infected system, or take control of the
system.
It typically gets into your system without your consent
and can be delivered via various communication
channels such as email, web, or USB drives.
1.1.1 Explain type of Malware
Trojan : Malware that disguises
itself as a regular program to Adware : Malware that presents
Ransomware : Malware that
Virus : Malware that is capable trick users to installit on their unwanted advertisements (ads)
Worm : whereas a worm can holds the system for ransom by
of copying itself and spreading systems. Once installed, it can to the user. They usually get
spread without user locking users out of their
to other computers. A virus perform malicious actions such delivered via free downloads
intervention. computer or by encrypting
needs user intervention, as stealing sensitive data, and can forcibly install software
their files.
uploading files to the attacker's on your system.
server, or monitoring webcams.
1.1.2 Describe the impact of malware in
security environment
The following are some of the malicious actions performed by malware:
Disrupting computer operations
Stealing sensitive information, including personal, business, and financial data
Unauthorized access to the victim's system
Spying on the victims
Sending spam emails
Engaging in distributed-denial-of-service attacks (DDOS)
Locking up the files on the computer and holding them for ransom
1.2 Identifies types of Malware Analysis
1.2.1 Explain Static Analysis
1.2.2 Explain Dynamic Analysis
1.2.1 Explain Static Analysis
This is the process of analyzing a binary without executing it. It is
easiest to perform and allows you to extract the metadata associated with the
suspect binary. Static analysis might not reveal all the required information, but
it can sometimes provide interesting information that helps in determining
where to focus your subsequent analysis efforts
1.2.2 Explain Dynamic Analysis
This is the process of executing the suspect binary in an isolated
environment and monitoring its behavior. This analysis technique is easy
to perform and gives valuable insights into the activity of the binary
during its execution. This analysis technique is useful but does not reveal
all the functionalities of the hostile program
1.3 Demonstrate Malware Analysis Lab
Environment
1.3.1 Uses VirtualBox/ Vmware for Malware Analysis Lab Environment
1.3.2 Uses Windows for Malware Analysis Lab Environment
1.3.3 Uses Ubuntu for Malware Analysis Lab Environment
Lab Environment setup
Lab Environment setup
1. VirtualBox
Vmware
1. Windows
2. Ubuntu
Lab Environment setup
1. VirtualBox
2. Windows 7
3. Ubuntu
Linux VM – Update and tool installation
$ sudo apt-get update
$ sudo apt-get install python-pip
$ sudo pip install yara-python
$ pip install --upgrade pip
$ sudo apt-get install ssdeep
$ sudo apt-get install build-essential libffi-dev
$ sudo apt-get install python-magic
python python-dev \ libfuzzy-dev
$ sudo apt-get install upx $ sudo pip install ssdeep
$ sudo apt-get install wireshark
$ sudo pip install pefile $ sudo apt-get install tshark
$ sudo apt-get install yara
Linux VM – Update and tool installation
• sudo apt-get install software-properties-
common
• sudo apt-add-repository universe
• sudo apt-get update
• sudo apt-get install python-pip
Linux VM – Installing INetSIM
INetSIM is a powerful utility that allows simulating various Internet services (such as
DNS, and HTTP) that malware frequently expects to interact with.
apt-key adv --fetch-keys http://www.inetsim.org/inetsim-
archive-signing-key.asc
cat inetsim-archive-signing-key.asc | apt-key add -
apt install inetsim
https://www.youtube.com/watch?v=BGhZ0o0s7eM
Linux VM - Networking
sudo gedit /etc/network/interfaces
Add the following entries at the end of the file (make sure you
replace ens33
with the interface name on your system) and save it:
auto ens33
iface ens33 inet static
address 192.168.1.100
netmask 255.255.255.0
Linux VM - Networking
$ sudo gedit /etc/inetsim/inetsim.conf
Go to the service_bind_address section in the configuration file and add the
entry shown here:
service_bind_address 192.168.1.100
Linux VM - Networking
$ sudo gedit /etc/inetsim/inetsim.conf
By default, INetSim's DNS server will resolve all the domain names to 127.0.0.1.
Instead of that, we want the domain name to resolve to 192.168.1.100 (the IP address of
Linux VM).
To do that, go to the dns_default_ip section in the configuration file and add an entry as
shown
here:
dns_default_ip 192.168.1.100
Linux VM - Networking
Linux VM
Install Guest Additions
Shared Clipboard and Drag 'n’ Drop - Bidirectional
Windows 7 – Networking
Windows 7 – Turn off Windows Defender
Windows key + R to open the Run menu, enter gpedit.msc,
Computer Configuration |
Administrative Templates
| Windows Components |
Windows Defender.
Windows 7 – Flare VM
After installation of Win 7 – Install Flare VM
https://github.com/fireeye/flare-vm
Follow the instructions in the github
Windows 7 – Flare VM
After installation of Win 7 – Install Flare VM
https://github.com/fireeye/flare-vm
Follow the instructions in the github
• thezoo: http:/ / thezoo. morirt. com/
• hybrid analysis: https:/ / www. hybrid-
Malware Sources analysis. com/
• virusbay: https:/ / beta. virusbay. io/
• virusshare: https:/ / virusshare. com/