SlideShare a Scribd company logo
Malware Attribution
Theory, Code and Result
Who am I?
• Michael Boman, M.A.R.T. project
• Have been “playing around” with malware
analysis “for a while”

• Working for FireEye
• This is a HOBBY project that I use my
SPARE TIME to work on
Agenda
Theory
behind Malware Attribution

Code
to conduct Malware Attribution analysis

Result
of analysis
Theory
•

Malware Attribution: tracking cyber spies - Greg Hoglund, Blackhat
2010
http://www.youtube.com/watch?v=k4Ry1trQhDk
What am I trying to
do?
Move this way
Binary

Human
What am I trying to
do?
Blacklists

Binary

Net Recon
Command
and Control

Developer
Fingerprints

Tactics
Techniques
Procedures

Social
Cyberspace
DIGINT

Physical
Surveillance
HUMINT

Human
What am I trying to
do?
Blacklists

Binary

Net Recon
Command
and Control

Developer
Fingerprints

Tactics
Techniques
Procedures

Social
Cyberspace
DIGINT

Physical
Surveillance
HUMINT

Human
Blacklists

Net Recon
Command
and Control

Developer
Fingerprints

Tactics
Techniques
Procedures

Social
Cyberspace
DIGINT

Physical
Surveillance
HUMINT
Physical
Surveillance
HUMINT
Social
Cyberspace
DIGINT
Developer
Fingerprints

Tactics
Techniques
Procedures
Blacklists

Net Recon
Command
and Control

Actions / Intent
Installation / Deployment
CNA (spreader) / CNE (search & exfil tool)
COMS
Defensive / Anti-forensic
Exploit
Shellcode
DNS, Command and Control Protocol,
Encryption
Physical
Surveillance
HUMINT
Social
Cyberspace
DIGINT
Developer
Fingerprints

Tactics
Techniques
Procedures
Blacklists

Net Recon
Command
and Control

Actions / Intent
Installation / Deployment
CNA (spreader) / CNE (search & exfil tool)
COMS
Defensive / Anti-forensic
Exploit
Shellcode
DNS, Command and Control Protocol,
Encryption
Steps
• Step 0: Gather malware
• Step 1: Extract metadata from binary
• Step 2: Store metadata and binary in
MongoDB

• Step 3: Analyze collected data
Step 0: Gather malware
•
•
•
•

VirusShare (virusshare.com)

•

Malware Domain List
(www.malwaredomainlist.com/mdl.php)

OpenMalware (www.offensivecomputing.net)
MalShare (www.malshare.com)
CleanMX (support.clean-mx.de/clean-mx/
viruses)
Step 1: Extract
metadata from binary
Development Steps
Source
Core “backbone”
sourcecode

Machine

Binary

Tweaks & Mods
Compiler
3rd party
sourcecode

3rd party libraries

Time

Runtime
libraries

Paths

MAC
Address

Malware

Packing
Development Steps
Source
Core “backbone”
sourcecode

Machine

Binary

Tweaks & Mods
Compiler
3rd party
sourcecode

3rd party libraries

Time

Runtime
libraries

Paths

MAC
Address

Malware

Packing
Development Steps
Source
Core “backbone”
sourcecode

Machine

Binary

Tweaks & Mods
Compiler
3rd party
sourcecode

3rd party libraries

Time

Runtime
libraries

Paths

MAC
Address

Malware

Packing
Step 1: Extract
metadata from binary

•
•
•
•
•

Hashes (for sample identification)

•

md5, sha1, sha256, sha512, ssdeep etc.

File type / Exif / PEiD

•

Compiler / Packer etc.

PE Headers / Imports / Exports etc.
Virustotal results
Tags
Identifying
compiler / packer
• PEiD

• Python
• peutils.SignatureDatabase().match_all()
PE Header information
VirusTotal Results
Tags
• User-supplied tags to identify sample
source and behavior

• analyst / analyst-system supplied
Step 2: Store metadata
and binary in MongoDB
Components
•
•

Modified VXCage server

•

Stores malware & metadata
in MongoDB instead of FS /
ORDBMS

Collects a lot more
metadata then the original
VXCage REST API
•
•
•

/malware/add

•

Add sample

/malware/get/<filehash>

•

Download sample. If no local sample, search other repos

/malware/find

•

Search for sample by md5, sha256, ssdeep, tag, date

• /tags/list
•

List tags
Step 3: Analyze
collected data
Identifying development
environments
• Compiler / Linker / Libraries
• Strings
• Paths
• PE Translation header
• Compile times
• Number of times a software been built
Cataloging behaviors
• Packers
• Encryption
• Anti-debugging
• Anti-VM
• Anti-forensics
Result
Have I seen you before?

• Detects similar malware (based on SSDEEP
fuzzy hashing)
Different MD5,
100% SSDeep match
SSDEEP Analysis

(3007)
SSDEEP Analysis

(3007)
SSDEEP Analysis

(851)
Challanges
• Party handshake problem:
• 707k samples analyzed and counting

(resulting in over 250 billion compares!)

• Need a better target (pre-)selection
What compilers /
packers are common?
1. "Borland Delphi 3.0 (???)", 54298
2. "Microsoft Visual C++ v6.0", 33364
3. "Microsoft Visual C++ 8", 28005
4. "Microsoft Visual Basic v5.0 - v6.0", 26573
5. "UPX v0.80 - v0.84", 22353
Are there any
unidentified packers?
• How to identify a packer
• PE Section is empty in binary, is writable
and executable
How common are antidebugging techniques?
• 31622 out of 531182 PE binaries uses
IsDebuggerPresent (6 %)

• Packed executable uncounted
Analysis Coverage
Source
Core “backbone”
sourcecode

Machine

Binary

Tweaks & Mods
Compiler
3rd party
sourcecode

3rd party libraries

Time

Runtime
libraries

Paths

MAC
Address

Malware

Packing
Future
What am I trying to do
in the future
Blacklists

Binary

Net Recon
Command
and Control

Developer
Fingerprints

Tactics
Techniques
Procedures

Social
Cyberspace
DIGINT

Physical
Surveillance
HUMINT

Human

Expand scope of analysis
+network +memory +os changes +behavior
What am I trying to do
in the future
• More automation
• More modular design
• Solve the “Big Data” issue I am getting
myself into (Hadoop?)

• More pretty graphs
Thank you
• Michael Boman
• michael@michaelboman.org
• @mboman
• http://blog.michaelboman.org
• Code available at https://github.com/
mboman/vxcage

More Related Content

ODP
44CON 2014: Using hadoop for malware, network, forensics and log analysis
PDF
Performing network security analytics
PPTX
Performing Network & Security Analytics with Hadoop
PPTX
Hadoop / Spark on Malware Expression
PPTX
Applied Detection and Analysis Using Flow Data - MIRCon 2014
PDF
Managing your black friday logs Voxxed Luxembourg
PDF
Managing your Black Friday Logs NDC Oslo
PPTX
MOLOCH: Search for Full Packet Capture (OA Cyber Summit)
44CON 2014: Using hadoop for malware, network, forensics and log analysis
Performing network security analytics
Performing Network & Security Analytics with Hadoop
Hadoop / Spark on Malware Expression
Applied Detection and Analysis Using Flow Data - MIRCon 2014
Managing your black friday logs Voxxed Luxembourg
Managing your Black Friday Logs NDC Oslo
MOLOCH: Search for Full Packet Capture (OA Cyber Summit)

What's hot (20)

PDF
2015 moloch recipes
PPTX
Leveraging DNS to Surface Attacker Activity
PPTX
Blackhat 2018 - The New Pentest? Rise of the Compromise Assessment
PPTX
Big Data Analytics 3: Machine Learning to Engage the Customer, with Apache Sp...
PPTX
Billions & Billions of Logs
PPTX
PDF
Managing your black friday logs - Code Europe
PPT
Using Canary Honeypots for Network Security Monitoring
PPTX
Big Data Science with H2O in R
PDF
DAVIX - Data Analysis and Visualization Linux
PPTX
Filar seymour oreilly_bot_story_
PPTX
Minimum technology stack to setup Hadoop lab
PDF
Treasure Data Cloud Strategy
PDF
Csongor Tamás - Examples of Locality Sensitive Hashing & their Usage for Malw...
PDF
Interactive Data Analysis with Apache Flink @ Flink Meetup in Berlin
PPTX
Incident Response for the Work-from-home Workforce
PPTX
Real-Time Status Commands
PPTX
Treat Detection using Hadoop
PPTX
Mongo db multidc_webinar
PPTX
November 2013 HUG: Cyber Security with Hadoop
2015 moloch recipes
Leveraging DNS to Surface Attacker Activity
Blackhat 2018 - The New Pentest? Rise of the Compromise Assessment
Big Data Analytics 3: Machine Learning to Engage the Customer, with Apache Sp...
Billions & Billions of Logs
Managing your black friday logs - Code Europe
Using Canary Honeypots for Network Security Monitoring
Big Data Science with H2O in R
DAVIX - Data Analysis and Visualization Linux
Filar seymour oreilly_bot_story_
Minimum technology stack to setup Hadoop lab
Treasure Data Cloud Strategy
Csongor Tamás - Examples of Locality Sensitive Hashing & their Usage for Malw...
Interactive Data Analysis with Apache Flink @ Flink Meetup in Berlin
Incident Response for the Work-from-home Workforce
Real-Time Status Commands
Treat Detection using Hadoop
Mongo db multidc_webinar
November 2013 HUG: Cyber Security with Hadoop
Ad

Similar to DEEPSEC 2013: Malware Datamining And Attribution (20)

PPTX
Malware analysis
PDF
Project in malware analysis:C2C
PPTX
Malware Static Analysis
PDF
Cyber Defense Forensic Analyst - Real World Hands-on Examples
PPTX
Introduction to Malware Analysis
PDF
Intro2 malwareanalysisshort
PPTX
PPTX
Malware Analysis Techniques &Incident Response.pptx
PPTX
Practical Malware Analysis: Ch 0: Malware Analysis Primer & 1: Basic Static T...
PDF
H@dfex 2015 malware analysis
PDF
CNIT 126 Ch 0: Malware Analysis Primer & 1: Basic Static Techniques
PDF
Automated In-memory Malware/Rootkit Detection via Binary Analysis and Machin...
PDF
Malware Analysis -an overview by PP Singh
PDF
'Malware Analysis' by PP Singh
PPTX
Malware Analysis 101: N00b to Ninja in 60 Minutes at BSidesDC on October 19, ...
PDF
Hunting malware via memory forensics
PPTX
Malware analysis as a hobby (Owasp Göteborg)
PPTX
Let's Talk Technical: Malware Evasion and Detection
PPTX
Malware 101 by saurabh chaudhary
PDF
Malware Analysis Tips and Tricks.pdf
Malware analysis
Project in malware analysis:C2C
Malware Static Analysis
Cyber Defense Forensic Analyst - Real World Hands-on Examples
Introduction to Malware Analysis
Intro2 malwareanalysisshort
Malware Analysis Techniques &Incident Response.pptx
Practical Malware Analysis: Ch 0: Malware Analysis Primer & 1: Basic Static T...
H@dfex 2015 malware analysis
CNIT 126 Ch 0: Malware Analysis Primer & 1: Basic Static Techniques
Automated In-memory Malware/Rootkit Detection via Binary Analysis and Machin...
Malware Analysis -an overview by PP Singh
'Malware Analysis' by PP Singh
Malware Analysis 101: N00b to Ninja in 60 Minutes at BSidesDC on October 19, ...
Hunting malware via memory forensics
Malware analysis as a hobby (Owasp Göteborg)
Let's Talk Technical: Malware Evasion and Detection
Malware 101 by saurabh chaudhary
Malware Analysis Tips and Tricks.pdf
Ad

More from Michael Boman (20)

PPTX
How to drive a malware analyst crazy
PPTX
Indicators of compromise: From malware analysis to eradication
PPT
44CON 2013 - Controlling a PC using Arduino
PDF
Malware Analysis on a Shoestring Budget
PPTX
Malware Analysis as a Hobby
PPTX
Malware analysis as a hobby - the short story (lightning talk)
KEY
Sans och vett på Internet
PDF
Blackhat USA 2011 - Cesar Cerrudo - Easy and quick vulnerability hunting in W...
PPT
Hur man kan testa sin HTTPS-server
PPT
OWASP AppSec Research 2010 - The State of SSL in the World
PPTX
Enkla hackerknep för testare
ODP
Privacy In Wireless Networks Keeping Your Private Data Private 2008-08-08
ODP
USB (In)Security 2008-08-22
ODP
Automatic Malware Analysis 2008-09-19
ODP
Overcoming USB (In)Security
PPT
Privacy in Wireless Networks
PDF
Network Security Monitoring - Theory and Practice
ODP
Introduction To Linux Security
ODP
ODP
SoHo Honeypot (LUGS)
How to drive a malware analyst crazy
Indicators of compromise: From malware analysis to eradication
44CON 2013 - Controlling a PC using Arduino
Malware Analysis on a Shoestring Budget
Malware Analysis as a Hobby
Malware analysis as a hobby - the short story (lightning talk)
Sans och vett på Internet
Blackhat USA 2011 - Cesar Cerrudo - Easy and quick vulnerability hunting in W...
Hur man kan testa sin HTTPS-server
OWASP AppSec Research 2010 - The State of SSL in the World
Enkla hackerknep för testare
Privacy In Wireless Networks Keeping Your Private Data Private 2008-08-08
USB (In)Security 2008-08-22
Automatic Malware Analysis 2008-09-19
Overcoming USB (In)Security
Privacy in Wireless Networks
Network Security Monitoring - Theory and Practice
Introduction To Linux Security
SoHo Honeypot (LUGS)

Recently uploaded (20)

PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
PDF
Accuracy of neural networks in brain wave diagnosis of schizophrenia
PDF
Encapsulation_ Review paper, used for researhc scholars
PDF
cuic standard and advanced reporting.pdf
PDF
Machine learning based COVID-19 study performance prediction
PPTX
1. Introduction to Computer Programming.pptx
PDF
Unlocking AI with Model Context Protocol (MCP)
PPTX
Spectroscopy.pptx food analysis technology
PDF
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
PDF
Assigned Numbers - 2025 - Bluetooth® Document
PDF
NewMind AI Weekly Chronicles - August'25-Week II
PPT
Teaching material agriculture food technology
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PPTX
MYSQL Presentation for SQL database connectivity
PDF
Encapsulation theory and applications.pdf
PDF
Approach and Philosophy of On baking technology
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
Digital-Transformation-Roadmap-for-Companies.pptx
Reach Out and Touch Someone: Haptics and Empathic Computing
Accuracy of neural networks in brain wave diagnosis of schizophrenia
Encapsulation_ Review paper, used for researhc scholars
cuic standard and advanced reporting.pdf
Machine learning based COVID-19 study performance prediction
1. Introduction to Computer Programming.pptx
Unlocking AI with Model Context Protocol (MCP)
Spectroscopy.pptx food analysis technology
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
Assigned Numbers - 2025 - Bluetooth® Document
NewMind AI Weekly Chronicles - August'25-Week II
Teaching material agriculture food technology
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
Building Integrated photovoltaic BIPV_UPV.pdf
MYSQL Presentation for SQL database connectivity
Encapsulation theory and applications.pdf
Approach and Philosophy of On baking technology
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...

DEEPSEC 2013: Malware Datamining And Attribution