SlideShare a Scribd company logo
End-to-End Analysis of a
Domain Generating
Algorithm Malware Family
Jason Geffner
Sr. Security Researcher
CrowdStrike, Inc.
Black Hat USA 2013
Domain Generating Algorithms
• Most modern malware communicates with
attackers’ servers
• Typical bots/RATs/downloaders
• DGA malware
DGA Example
•  Every minute, have malware connect to GMT-time-
based server address
•  <month><day><year><hour><minute>.com
•  On July 31, 2013, at 2:30 PM, malware connects to
0731131430.com
•  Attacker registers domain and server prior to strike-time
•  Attacker redirects domain and takes down server
immediately aer strike-time
Notable DGA History
•  Early 2008 – Kraken one of the first malware families to
use a DGA
•  Late 2008 – Conficker first discovered
•  2010 – Texas A&M University researchers publish paper
on detecting DGA domain names
•  2012 – Damballa releases whitepaper on new DGA use
in six malware families
New DGA Family
•  In February of 2013, a major American financial
services firm received a suspicious email with an EXE
file attachment
•  Firm’s CISO sent the attachment to their “global cyber
intelligence” partner, who had trouble analyzing it:
“It is the obfuscation that is throwing redacted off.”
•  As a result, the CISO forwarded it to us
REDACTED
Code Obfuscation
• Most obfuscated malware is obfuscated with a
packer
• This malware uses inline code obfuscation
This snippet of disassembly
shows random 32-bit values
being assigned to variables
and used in mathematical
calculations.
This junk code is interspersed
with legitimate code.
x	
  
	
  ✔	
  
x	
  
x	
  
x	
  
x	
  
x	
  
x	
  
x	
  
x	
  
x	
  
x	
  
	
  ✔	
  
x	
  
x	
  
x	
  
	
  ✔	
  
	
  ✔	
  
x	
  
x	
  
x	
  
x	
  
This snippet of disassembly
shows random 32-bit values
being assigned to variables
and used in mathematical
calculations.
This junk code is interspersed
with legitimate code.
End-to-End Analysis of a Domain Generating Algorithm Malware Family
End-to-End Analysis of a Domain Generating Algorithm Malware Family
End-to-End Analysis of a Domain Generating Algorithm Malware Family
Code Deobfuscation
•  Find all basic legitimate variables
•  Function arguments to the current function
•  Global variables
•  Local function variables used as parameters to function calls
•  Local function variables that store return values of function calls
•  All other local function variables considered legitimate if
their values are read from or written to other legitimate
variables
Decompilation Graph, Before Deobfuscation
Decompilation Graph, Aer Deobfuscation
Demo
CrowdDetox
CrowdDetox
• Free open-source plugin for Hex-Rays
• Finds legitimate variables and code in a
decompilation graph, and prunes everything else
• Available at
http://www.crowdstrike.com/community-tools
Data Obfuscation
•  EXE contains no readable static strings related to
malicious functionality
•  No registry keys
•  No file names
•  No server addresses
•  No URI paths
•  All strings are decrypted at run time
End-to-End Analysis of a Domain Generating Algorithm Malware Family
Dynamically Deobfuscating Data
•  Within first hour of incident response
•  Found string decryption function
•  Identified list of encrypted strings
•  Patched binary to decrypt strings in-place as opposed to
on heap
•  Patched binary with hand-written assembly to call string
decryption function on each encrypted string
Statically Deobfuscating Data
• String decryption function XORs encrypted strings
with one-time pad
• One-time pad is generated at run time
Generation of One-Time Pad
for	
  (i	
  =	
  0;	
  i	
  <	
  lengthOfOneTimePad;	
  i	
  +=	
  4)	
  
{	
  
	
  	
  	
  	
  oneTimePad[i	
  +	
  0]	
  =	
  (seed	
  >>	
  0x00)	
  &	
  0xFF;	
  
	
  	
  	
  	
  oneTimePad[i	
  +	
  1]	
  =	
  (seed	
  >>	
  0x08)	
  &	
  0xFF;	
  
	
  	
  	
  	
  oneTimePad[i	
  +	
  2]	
  =	
  (seed	
  >>	
  0x10)	
  &	
  0xFF;	
  
	
  	
  	
  	
  oneTimePad[i	
  +	
  3]	
  =	
  (seed	
  >>	
  0x18)	
  &	
  0xFF;	
  
	
  
	
  	
  	
  	
  seedRotated	
  =	
  ((seed	
  >>	
  1)	
  |	
  (seed	
  <<	
  (32	
  -­‐	
  1)));	
  
	
  
	
  	
  	
  	
  seed	
  =	
  
	
  	
  	
  	
  	
  	
  	
  	
  (seedRotated	
  &	
  0xFFFF0000)	
  |	
  
	
  	
  	
  	
  	
  	
  	
  	
  ((seedRotated	
  +	
  ((seedRotated	
  >>	
  0x08)	
  &	
  0xFF))	
  &	
  0xFF)	
  <<	
  0x08)	
  |	
  
	
  	
  	
  	
  	
  	
  	
  	
  ((2	
  *	
  seedRotated	
  +	
  ((seedRotated	
  >>	
  0x08)	
  &	
  0xFF))	
  &	
  0xFF);	
  
}	
  
Statically Decrypting All Strings
for	
  (i	
  =	
  0;	
  i	
  <	
  (lengthOfOneTimePad	
  –	
  0x0C);	
  i++)	
  
{	
  
	
  	
  	
  	
  beginningOfStrings[i]	
  ^=	
  oneTimePad[0x0C	
  +	
  i];	
  
}	
  
Malware Family Template
•  Initially collected over 100 variants from this malware family
•  Most use randomized strings in decrypted data
•  File names
•  Directory names
•  Registry names
•  A few use template placeholders instead of randomized
strings
Malware Family History
• CrowdStrike initially collected:
•  16 “template” variants
•  132 non-“template” variants
• PE Timestamps appear to be legitimate
• Malware first built and distributed in February,
2013
Variants Grouped by PE Timestamp
0
5
10
15
20
25
30
35
40
45
2/2/13,
21:00
2/2/13,
22:00
… 2/5/13,
18:00
2/5/13,
19:00
2/5/13,
20:00
"Template" Variants
Non-"Template" Variants
NumberofVariants
PE Timestamp, Bucketed by Hour (UTC)
Authorship Clues in Decrypted Strings
• All variants using default template have the same
seed value: 0x445A4950
• Parsed as ASCII, 0x445A4950 = “PIZD”
• “PIZD” translates from Bosnian / Croatian /
Latvian / Polish / Romani / Romanian / Slovenian
to English as “PUSSY”
Authorship Clues in Decrypted Strings
• Template string for copied file name is
“XZSEQWSpulaosugiingat.exe”
• “pula o sug i în gât” loosely translates from
Romanian to English as “suck a dick in your
throat”
Authorship Clues in Decrypted Strings
• However, a Romanian is more likely to say, “suge
pula în gât”
• “pula o sug i în gât” is more likely the wording a
Romani would use
• Additionally, a Romanian is more likely to say
“pizda” than “pizd”; a Romani would say “pizd”
Decrypted Strings Suggest Romani Author
•  Template strings for directory name and registry value
names are “NICOLAEGUTAXZSEQWS” and
“COSTIIONITAEQWS”
•  Template string used in entry point obfuscation is
“ADRIANCOPILUMINUNESIFLORINSALAM”
•  Nicolae Guţă, Costi Ioniță, Adrian Copilul Minune, and
Florin Salam are prominent Romani manele singers
Domain Generating Algorithm
• All variants of family contain identical 384-word
list of common English words, decrypted at run
time
• Domain names created by concatenating two
pseudo-randomly selected words and
appending “.net” to the end
above
action
advance
afraid
against
airplane
almost
alone
already
although
always
amount
anger
angry
animal
another
answer
appear
apple
around
arrive
article
attempt
banker
basket
battle
beauty
became
because
become
before
begin
behind
being
believe
belong
beside
better
between
beyond
bicycle
board
borrow
bottle
bottom
branch
bread
bridge
bright
bring
broad
broken
brought
brown
building
built
business
butter
captain
carry
catch
caught
century
chair
chance
character
charge
chief
childhood
children
choose
cigarette
circle
class
clean
clear
close
clothes
college
company
complete
condition
consider
contain
continue
control
corner
country
course
cover
crowd
daughter
decide
degree
delight
demand
desire
destroy
device
difference
different
difficult
dinner
direct
discover
distance
distant
divide
doctor
dollar
double
doubt
dress
dried
during
early
eearly
effort
either
electric
electricity
english
enough
enter
escape
evening
every
except
expect
experience
explain
family
famous
fancy
father
fellow
fence
fieen
fight
figure
finger
finish
flier
flower
follow
foreign
forest
forever
forget
fortieth
forward
found
fresh
friend
further
future
garden
gather
general
gentle
gentleman
glass
glossary
goodbye
govern
guard
happen
health
heard
heart
heaven
heavy
history
honor
however
hunger
husband
include
increase
indeed
industry
inside
instead
journey
kitchen
known
labor
ladder
language
large
laugh
laughter
leader
leave
length
letter
likely
listen
little
machine
manner
market
master
material
matter
mayor
measure
meeting
member
method
middle
might
million
minute
mister
modern
morning
mother
mountain
movement
nation
nature
nearly
necessary
needle
neighbor
neither
niece
night
north
nothing
notice
number
object
oclock
office
oen
opinion
order
orderly
outside
paint
partial
party
people
perfect
perhaps
period
person
picture
pleasant
please
pleasure
position
possible
power
prepare
present
president
pretty
probable
probably
problem
produce
promise
proud
public
quarter
question
quiet
rather
ready
realize
reason
receive
record
remember
report
require
result
return
ridden
right
river
round
safety
school
season
separate
service
settle
severa
several
shake
share
shore
short
should
shoulder
shout
silver
simple
single
sister
smell
smoke
soldier
space
speak
special
spent
spread
spring
square
station
still
store
storm
straight
strange
stranger
stream
street
strength
strike
strong
student
subject
succeed
success
sudden
suffer
summer
supply
suppose
surprise
sweet
system
therefore
thick
think
third
those
though
thought
through
thrown
together
toward
trade
train
training
travel
trouble
trust
twelve
twenty
understand
understood
until
valley
value
various
wagon
water
weather
welcome
wheat
whether
while
white
whose
window
winter
within
without
woman
women
wonder
worth
would
write
written
yellow
DGA Dictionary
Domain Generating Algorithm
•  Pseudo-random algorithm uses only 15 bits of the seed value, so
only 32,768 possible domain names
Seed Value = ​seconds  elapsed  since  January  1,  1970  GMT/512 
∴ Seed Granularity = 512 seconds = 8 minutes and 32 seconds
•  Malware tries 85 domains per seed value (seed+0, seed+1, seed
+2, …), creating a sliding “window” of DGA domains
string	
  GetHostname(UInt32	
  seed)	
  
{	
  
	
  	
  byte[]	
  aShuffle	
  =	
  new	
  byte[15];	
  
	
  	
  for	
  (int	
  i	
  =	
  0;	
  i	
  <	
  15;	
  i++)	
  
	
  	
  {	
  
	
  	
  	
  	
  aShuffle[aHelperTable[i	
  *	
  2]]	
  =	
  (byte)(seed	
  &	
  1);	
  
	
  	
  	
  	
  seed	
  >>=	
  1;	
  
	
  	
  }	
  
	
  	
  
	
  	
  int	
  iHost1	
  =	
  0;	
  
	
  	
  int	
  iHost2	
  =	
  0;	
  
	
  	
  for	
  (int	
  i	
  =	
  0;	
  i	
  <	
  7;	
  i++)	
  
	
  	
  {	
  
	
  	
  	
  	
  iHost1	
  =	
  2	
  *	
  iHost1	
  |	
  aShuffle[i];	
  
	
  	
  	
  	
  iHost2	
  =	
  2	
  *	
  iHost2	
  |	
  aShuffle[i	
  +	
  7];	
  
	
  	
  }	
  
	
  	
  
	
  	
  iHost2	
  =	
  (2	
  *	
  iHost2	
  |	
  aShuffle[14])	
  +	
  128;	
  
	
  	
  
	
  	
  UInt16	
  offsetHost1	
  =	
  (UInt16)((UInt16)(aHexHostname[iHost1	
  *	
  2])	
  +	
  (UInt16)(((UInt16)(aHexHostname[iHost1	
  *	
  2	
  +	
  1]))	
  <<	
  0x08));	
  
	
  	
  UInt16	
  offsetHost2	
  =	
  (UInt16)((UInt16)(aHexHostname[iHost2	
  *	
  2])	
  +	
  (UInt16)(((UInt16)(aHexHostname[iHost2	
  *	
  2	
  +	
  1]))	
  <<	
  0x08));	
  
	
  	
  
	
  	
  string	
  host1	
  =	
  "";	
  
	
  	
  string	
  host2	
  =	
  "";	
  
	
  	
  
	
  	
  byte	
  b;	
  
	
  	
  while	
  ((b	
  =	
  aHostStrings[offsetHost1++])	
  !=	
  0)	
  
	
  	
  {	
  
	
  	
  	
  	
  host1	
  +=	
  (char)b;	
  
	
  	
  }	
  
	
  	
  while	
  ((b	
  =	
  aHostStrings[offsetHost2++])	
  !=	
  0)	
  
	
  	
  {	
  
	
  	
  	
  	
  host2	
  +=	
  (char)b;	
  
	
  	
  }	
  
	
  	
  
	
  	
  return	
  host1	
  +	
  host2	
  +	
  ".net";	
  
}	
  
Malware’s Use of DGA
• Malware regularly connects to DGA domains to
send HTTP GET request
•  /forum/search.php?email=<hardcoded email
address>&method=post
• Each malware variant has a unique hardcoded
email address
Malware’s Use of DGA
• If the server’s response contains the correct
fingerprint, the malware requests the same URL
again
• If the server’s second response contains the
correct fingerprint, the malware saves the
downloaded content as an EXE and executes it
Sinkholing
•  Sinkholed five domains to which the DGA would resolve on:
•  March 5, 2013
•  March 6, 2013
•  March 7, 2013
•  March 8, 2013
•  March 9, 2013
•  Nearly 15,000 hits from malware
•  Logged 1,170 unique client IP addresses
•  Logged 1,000 unique email addresses posted to sinkhole servers
0
1000
2000
3000
4000
5000
6000
7000
8000
Sinkhole ActivityHitsperday
Example Email Addresses Posted to Sinkholes
•  1800flowers@1800reminders.com
•  billing@deluxeforbusiness.com
•  consultant_fiscal-unsubscribe@yahoogroups.com
•  fbmessage+fepvdccz@facebookmail.com
•  geico_claims@geico.com
•  northwest.airlines@nwa.com
More Email Addresses Posted to Sinkholes
•  421 personal yahoo.com addresses
•  66 personal aol.com addresses
•  59 personal hotmail.com addresses
•  31 personal comcast.net addresses
•  4 .gov addresses
•  1 .mil address
•  0 gmail.com addresses
Sinkhole Hits From IP Addresses
1.  United States
2.  Romania
3.  Japan
4.  Russia
5.  Germany
6.  France
7.  India
8.  Netherlands
9.  United Kingdom
10.  Sweden
575
321
46
17
15
15
14
14
13
11
DGA Monitoring
• Developed automation solution to download
from DGA domains in real-time
• Domains connected to campaign responded
with identifiable HTTP response fingerprint
• Automation ran for two weeks
• Detected 20 domains connected to campaign
Domain Analysis
•  19 of the 20 domains
•  Registered via and hosted by Yahoo! Inc.’s Small Business
hosting plan
•  Registrants used @yahoo.com email account
•  1 of the 20 domains
•  Registered via and hosted by Omnis Network LLC
•  Registrants used @aol.com email account
Domain Analysis
•  All domains registered 0-48 hours before DGA pointed
to them
•  Identical registrant names and addresses used for
several domains, with semi-random phone numbers
corresponding to city area code
DOMAIN REGISTRANT ADMIN EMAIL ADMIN PHONE
amountcondition.net Robert Seifert
2212 W. Farwell
Chicago, IL 60645
seifertrobertw@yahoo.com +1.7737916544
weathereearly.net Robert Seifert
2212 W. Farwell
Chicago, IL 60645
robertwseifert@yahoo.com +1.7737916324
heardstrong.net Lynette Conlan
210 Pinehurst Way
San francisco, CA 94080
donnybonham184@yahoo.com +1.6505882763
variousopinion.net Lynette Conlan
210 Pinehurst Way
San francisco, CA 94080
alankimberley@yahoo.com +1.6505882742
morningpaint.net clint Bertke
299 lowry rd
fort recovery, OH 45846
clintmbertke@yahoo.com +1.4198523054
withinshould.net bertke, clint m
299 lowry rd
fort recovery, OH 45846
clintmbertke@aol.com +1.4198523054
Historic WHOIS Research
• 7 of the 20 domains hosted blank root webpages
during WHOIS research
• 3 of the 20 domains’ webservers were down
during WHOIS research
• The other 10 domains all hosted content for
“GlobalPartners Hungaria K.”
End-to-End Analysis of a Domain Generating Algorithm Malware Family
End-to-End Analysis of a Domain Generating Algorithm Malware Family
Sokratis Kokkalis
Chairman and CEO of
Intracom Holdings
Petros Souretis
Managing Director of
INTRAKAT, a subsidiary
of
Intracom Holdings
Sokratis Kokkalis
Chairman and CEO of
Intracom Holdings
Petros Souretis
Managing Director of
INTRAKAT, a subsidiary
of
Intracom Holdings
Sokratis Kokkalis
Chairman and CEO of
Intracom Holdings
INTRAKAT’s logo	
  
Scanning All DGA Domains
•  Scanned root webpage of all 32,768 possible DGA domains
for “GlobalPartners”
•  Found 44 additional domains, for a total of 64 campaign
domains
•  All but two registered through a Yahoo! Small Business
hosting plan
•  All domains registered for exactly one year
•  Oldest domain registered on February 3rd, 2013
Campaign Domain Registrant Email Addresses
•  Email addresses primarily fall into one of four categories
1.  Related to name of domain’s registrant
(marcosuriano21@yahoo.com for Marco Suriano)
2.  Related to name of another domain’s registrant, likely a mistake
made by adversary
(ike2ricchio4@yahoo.com for Kai Roth)
3.  Related to domain name
(degreeanimal@yahoo.com for degreeanimal.net)
4.  Related to domain name of another domain
(degreeanimal@yahoo.com for nightwagon.net)
Non-DGA Domains Used in Campaign
•  Open-source research led to non-DGA domains also
used in this campaign
•  antaragroup.org
•  ahai-group.com
•  azrhgroup.com
•  fastwire.us
•  int-group.us
•  international-wire.com
•  intracombusiness.com
•  intracomfinancial.com
•  itpservices.us
•  kpl-business.com
•  logicom-holding.com
•  mtkoffice.co.uk
•  rbs-partners.com
•  trust-core.net
End-to-End Analysis of a Domain Generating Algorithm Malware Family
Previously Researched Campaign History
•  Further investigation leads to research on anti-fraud site
http://www.bobbear.co.uk/
Extended Campaign History
•  March 2013
•  March 2013
•  February 2013
•  January 2013
•  September 2012
•  July 2011
•  April 2011
•  November 2009
Trust Core
Mojo Directo
GlobalPartners
Anatara Group
Ahai Group
Azure Holding Group
KPL
Logicom
•  May 2009
•  February 2009
•  December 2008
•  November 2008
•  June 2008
•  January 2008
•  September 2007
•  May 2007
RBS Partners
FastWire Group
INTRACOM
MTK
ITP
International Wire
INT Group
Interpay Group
Antivirus Detections
•  Malware appears to have begun circulating in
February 2013
•  Our analysis conducted in February and early March of
2013
•  Avast discovered a variant of it in June of 2013 -
https://blog.avast.com/2013/06/18/your-facebook-
connection-is-now-secured/
Antivirus Detections
Detection
Rate
Engine
Most Common
Detection
Detection
Rate
Engine
Most Common
Detection
100.0% Malwarebytes Trojan.Agent 88.4% Fortinet W32/Agent
99.3% ESET Win32/Agent 81.0% Norman Malware
98.6% AVG Generic_r 76.9% GFI VIPRE Trojan.Win32.Agent
98.6% Kaspersky Trojan.Win32.Generic 75.5% Avast Win32:Agent
98.0% Panda Trj/Genetic 38.1% McAfee Artemis
98.0% Sophos Troj/Agent 21.8% Trend Micro TROJ_GEN
95.2% G Data Gen:Variant.Zusy 17.7% Symantec WS.Reputation.1
93.2% Bitdefender Gen:Variant.Zusy 15.0% Microso Win32/Suppobox
91.8% F-Secure Gen:Variant.Zusy 0% ClamAV
Conclusion
•  DGA downloader likely authored by Romani male, who appears to be
working with a long-running European money mule crime syndicate
•  Another component apparently harvests email addresses, builds the
DGA component, and emails it to target recipients
•  DGA domains appear to be registered using stolen credit card
numbers
•  Inlined code obfuscation can be defeated with new CrowdDetox
plugin for Hex-Rays
Q & A
Special thanks to Alex Ionescu
for Romanian translations
@CrowdStrike

More Related Content

PPTX
Data Loss Prevention
PPTX
Google Dorks and SQL Injection
PDF
You can detect PowerShell attacks
PDF
Penetration testing web application web application (in) security
PDF
Understanding Keylogger
PDF
Adversary Emulation and Red Team Exercises - EDUCAUSE
PDF
DerbyCon 2019 - Kerberoasting Revisited
PDF
MITRE AttACK framework it is time you took notice_v1.0
Data Loss Prevention
Google Dorks and SQL Injection
You can detect PowerShell attacks
Penetration testing web application web application (in) security
Understanding Keylogger
Adversary Emulation and Red Team Exercises - EDUCAUSE
DerbyCon 2019 - Kerberoasting Revisited
MITRE AttACK framework it is time you took notice_v1.0

What's hot (20)

DOCX
The CIA Triad - Assurance on Information Security
PDF
Ceh v5 module 09 social engineering
PDF
Hunting for Privilege Escalation in Windows Environment
PDF
Red Team Methodology - A Naked Look
PPTX
Practical Malware Analysis: Ch 0: Malware Analysis Primer & 1: Basic Static T...
PDF
Beyond the mcse red teaming active directory
PDF
Managing privileged account security
PDF
Knowledge for the masses: Storytelling with ATT&CK
PPT
Ch 7 Physical D B Design
PDF
Complete Endpoint protection
PDF
Threat Hunting with Splunk
PDF
Supply Chain Attacks
PDF
Saml authentication bypass
PPT
Introduction to Web Application Penetration Testing
PPTX
PowerShell for Practical Purple Teaming
PDF
MITRE ATT&CKcon 2.0: Using Threat Intelligence to Focus ATT&CK Activities; Da...
PPTX
Introduction to path traversal attack
PPTX
OWASP Top 10 2021 What's New
PPTX
SQL(DDL & DML)
PPTX
Red Team Revenge - Attacking Microsoft ATA
The CIA Triad - Assurance on Information Security
Ceh v5 module 09 social engineering
Hunting for Privilege Escalation in Windows Environment
Red Team Methodology - A Naked Look
Practical Malware Analysis: Ch 0: Malware Analysis Primer & 1: Basic Static T...
Beyond the mcse red teaming active directory
Managing privileged account security
Knowledge for the masses: Storytelling with ATT&CK
Ch 7 Physical D B Design
Complete Endpoint protection
Threat Hunting with Splunk
Supply Chain Attacks
Saml authentication bypass
Introduction to Web Application Penetration Testing
PowerShell for Practical Purple Teaming
MITRE ATT&CKcon 2.0: Using Threat Intelligence to Focus ATT&CK Activities; Da...
Introduction to path traversal attack
OWASP Top 10 2021 What's New
SQL(DDL & DML)
Red Team Revenge - Attacking Microsoft ATA
Ad

Similar to End-to-End Analysis of a Domain Generating Algorithm Malware Family (20)

PDF
What are-you-investigate-today? (version 2.0)
PDF
What Will You Investigate Today?
PPTX
Hunting on the cheap
PPTX
Hunting on the Cheap
PDF
ShmooCon 2015: No Budget Threat Intelligence - Tracking Malware Campaigns on ...
PPTX
Protect Your Payloads: Modern Keying Techniques
PPTX
REMnux tutorial-2: Extraction and decoding of Artifacts
PDF
12 Investigating Windows Systems (Part 2 of 3)
PDF
OSINT for Attack and Defense
PPTX
An Adversarial View of SaaS Malware Sandboxes
PDF
CNIT 152: 12b Windows Registry
PDF
CNIT 152 12 Investigating Windows Systems (Part 2)
PDF
Malware Analysis Using Free Software
PDF
BlueHat v18 || The matrix has you - protecting linux using deception
PDF
CNIT 152: 12 Investigating Windows Systems (Part 2 of 3)
PDF
Malicious Domain Profiling
PDF
Ch 4: Footprinting and Social Engineering
PPTX
10 - IDNOG04 - Enrico Hugo (Indonesia Honeynet Project) - The Rise of DGA Mal...
PDF
Keith J. Jones, Ph.D. - Crash Course malware analysis
PDF
13 practical tips for writing secure golang applications
What are-you-investigate-today? (version 2.0)
What Will You Investigate Today?
Hunting on the cheap
Hunting on the Cheap
ShmooCon 2015: No Budget Threat Intelligence - Tracking Malware Campaigns on ...
Protect Your Payloads: Modern Keying Techniques
REMnux tutorial-2: Extraction and decoding of Artifacts
12 Investigating Windows Systems (Part 2 of 3)
OSINT for Attack and Defense
An Adversarial View of SaaS Malware Sandboxes
CNIT 152: 12b Windows Registry
CNIT 152 12 Investigating Windows Systems (Part 2)
Malware Analysis Using Free Software
BlueHat v18 || The matrix has you - protecting linux using deception
CNIT 152: 12 Investigating Windows Systems (Part 2 of 3)
Malicious Domain Profiling
Ch 4: Footprinting and Social Engineering
10 - IDNOG04 - Enrico Hugo (Indonesia Honeynet Project) - The Rise of DGA Mal...
Keith J. Jones, Ph.D. - Crash Course malware analysis
13 practical tips for writing secure golang applications
Ad

More from CrowdStrike (20)

PDF
State of Endpoint Security: The Buyers Mindset
PDF
Understanding Fileless (or Non-Malware) Attacks and How to Stop Them
PDF
Cyber Security Extortion: Defending Against Digital Shakedowns
PDF
An Inside Look At The WannaCry Ransomware Outbreak
PDF
Proactive Threat Hunting: Game-Changing Endpoint Protection Beyond Alerting
PDF
DEFENDING AGAINST THREATS TARGETING THE MAC PLATFORM
PDF
CrowdStrike CrowdCast: Is Ransomware Morphing Beyond The Ability Of Standard ...
PDF
How to Replace Your Legacy Antivirus Solution with CrowdStrike
PDF
Cloud-Enabled: The Future of Endpoint Security
PDF
Bear Hunting: History and Attribution of Russian Intelligence Operations
PDF
You Can't Stop The Breach Without Prevention And Detection
PDF
Battling Unknown Malware with Machine Learning
PDF
Java Journal & Pyresso: A Python-Based Framework for Debugging Java
PDF
Venom
PDF
CrowdCasts Monthly: When Pandas Attack
PDF
CrowdCast Monthly: Operationalizing Intelligence
PDF
CrowdCasts Monthly: Going Beyond the Indicator
PDF
CrowdCasts Monthly: You Have an Adversary Problem
PDF
CrowdCasts Monthly: Mitigating Pass the Hash
PDF
TOR... ALL THE THINGS
State of Endpoint Security: The Buyers Mindset
Understanding Fileless (or Non-Malware) Attacks and How to Stop Them
Cyber Security Extortion: Defending Against Digital Shakedowns
An Inside Look At The WannaCry Ransomware Outbreak
Proactive Threat Hunting: Game-Changing Endpoint Protection Beyond Alerting
DEFENDING AGAINST THREATS TARGETING THE MAC PLATFORM
CrowdStrike CrowdCast: Is Ransomware Morphing Beyond The Ability Of Standard ...
How to Replace Your Legacy Antivirus Solution with CrowdStrike
Cloud-Enabled: The Future of Endpoint Security
Bear Hunting: History and Attribution of Russian Intelligence Operations
You Can't Stop The Breach Without Prevention And Detection
Battling Unknown Malware with Machine Learning
Java Journal & Pyresso: A Python-Based Framework for Debugging Java
Venom
CrowdCasts Monthly: When Pandas Attack
CrowdCast Monthly: Operationalizing Intelligence
CrowdCasts Monthly: Going Beyond the Indicator
CrowdCasts Monthly: You Have an Adversary Problem
CrowdCasts Monthly: Mitigating Pass the Hash
TOR... ALL THE THINGS

Recently uploaded (20)

PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PDF
Network Security Unit 5.pdf for BCA BBA.
PPTX
Programs and apps: productivity, graphics, security and other tools
PDF
Machine learning based COVID-19 study performance prediction
PDF
Encapsulation theory and applications.pdf
PDF
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
PPTX
ACSFv1EN-58255 AWS Academy Cloud Security Foundations.pptx
PPTX
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PDF
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
PDF
NewMind AI Weekly Chronicles - August'25 Week I
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PDF
cuic standard and advanced reporting.pdf
PPTX
Cloud computing and distributed systems.
PPTX
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
PDF
Encapsulation_ Review paper, used for researhc scholars
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PDF
Approach and Philosophy of On baking technology
PPTX
Understanding_Digital_Forensics_Presentation.pptx
Mobile App Security Testing_ A Comprehensive Guide.pdf
Network Security Unit 5.pdf for BCA BBA.
Programs and apps: productivity, graphics, security and other tools
Machine learning based COVID-19 study performance prediction
Encapsulation theory and applications.pdf
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
ACSFv1EN-58255 AWS Academy Cloud Security Foundations.pptx
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
Advanced methodologies resolving dimensionality complications for autism neur...
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
NewMind AI Weekly Chronicles - August'25 Week I
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
cuic standard and advanced reporting.pdf
Cloud computing and distributed systems.
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
Encapsulation_ Review paper, used for researhc scholars
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
Approach and Philosophy of On baking technology
Understanding_Digital_Forensics_Presentation.pptx

End-to-End Analysis of a Domain Generating Algorithm Malware Family