SlideShare a Scribd company logo
Malware	
  Collec+on	
  and	
  Analysis
C.K.Chen	
  @	
  DSNSLab,	
  NCTU	
  
2014/05/20	
  
DSNS	
  
•  Boss	
  
–  謝續平教授	
  
•  IEEE	
  Fellow	
  
•  ACM	
  Dis+nguished	
  Scien+st	
  	
  
•  國立交通大學資訊工程系特聘教授 	
  
•  資通安全研究與教學中心主任 	
  
•  法務部調查局顧問	
  
•  實驗室研究方向	
  
–  惡意程式分析	
  
–  虛擬機器	
  
–  數位鑑識	
  
–  網路安全	
  
Outline
•  Rapid	
  Increasing	
  of	
  Malware	
  
•  Secmap	
  
–  Automa+c	
  Malware	
  Analysis	
  Cycle	
  
–  High	
  Performance	
  and	
  Fault	
  Tolerance	
  
–  Modula+on	
  
•  Malware	
  Collec+on	
  	
  
–  Disk	
  Forensics	
  
–  Email	
  ASachment	
  
–  Web	
  Crawler	
  
–  Malware	
  Sharing	
  Repository	
  
–  Honey	
  Pot	
  
•  Malware	
  ASributes	
  
	
  
u  Note:	
  Some	
  part	
  of	
  this	
  slide	
  is	
  removed	
  due	
  to	
  research	
  is	
  under	
  
processing.	
  	
  
Rapid	
  Increasing	
  of	
  Malware
•  Malware	
  increasing
McAfee	
  Labs	
  Threat	
  Report	
  in	
  Fourth	
  Quarter	
  2013
Malware	
  Life	
  Cycle
•  Malware	
  Life	
  Cycle	
  and	
  Response	
  Window
hSp://www.fireeye.com/blog/corporate/2014/05/ghost-­‐hun+ng-­‐with-­‐
an+-­‐virus.html
Malware	
  Analysis	
  Ecosystem	
  	
  
Internet
•  Machine	
  Learning	
  
•  System	
  Level	
  Virtual	
  Machine	
  
•  Taint	
  	
  
•  Symbolic	
  
•  Complex	
  Analysis
•  Signature-­‐based	
  Detec+on	
  
•  Classifier	
  
•  Informa+on	
  Collec+on	
  &	
  
Feedback
Back-­‐end	
  Cloud
Front-­‐end	
  Device
4.	
  Feedback	
  Info
3.	
  Update	
  Signature/Model
1.	
  Gathering	
  Sample
2.	
  Analysis
SECMAP
•  Scalable	
  sEcurity	
  Cloud-­‐compu+ng	
  for	
  Malware	
  Analysis	
  
Pla_orm(SECMAP)	
  
–  Aim	
  to	
  automa+c	
  whole	
  analysis	
  procedure	
  
•  Malware	
  Collec+on	
  
•  Malware	
  Storage	
  
•  Malware	
  Analysis	
  
•  Large	
  Scale	
  Data	
  Mining	
  
–  Increase	
  throughput	
  with	
  high	
  performance	
  compu+ng	
  
–  Decrease	
  overall	
  process	
  +me	
  to	
  shorten	
  response	
  window	
  
Clustering	
  with	
  Mahout
Analyzers
•  Malware	
  Behavior	
  Analyzer	
  
•  Forensor	
  
•  Malware	
  Func+on	
  Call	
  Trcer	
  
•  Malware	
  Code	
  Block	
  
Retriver	
  
•  Instruc+on	
  Trace	
  
•  Rootkit	
  Detec+on	
  
•  ……..	
  
•  ClamAV	
  
•  Avira	
  
•  Trend	
  Micro	
  
•  Kaspaskey	
  
•  VirusTotal
System	
  Screenshot
Malware	
  Collec+on
•  Malware	
  samples	
  can	
  help	
  to	
  construct	
  detec+on	
  
model,	
  design	
  signature	
  
•  Therefore,	
  we	
  use	
  following	
  way	
  to	
  collect	
  
samples	
  
–  HoneyPot	
  
–  Web	
  Crawler	
  
–  Shared	
  Repository	
  
–  Email	
  
–  Disk	
  Forensics	
  
–  User	
  Upload
Disk	
  Forensics
•  When	
  host	
  are	
  infected,	
  disk	
  forensics	
  is	
  needed	
  to	
  
discover	
  malware	
  
–  Delete	
  
–  Hidden	
  
•  Dele+ng	
  file	
  is	
  one	
  of	
  important	
  behavior	
  of	
  malware	
  
–  About	
  half	
  of	
  malware	
  delete	
  some	
  files	
  when	
  execu+on	
  
–  Malware	
  oden	
  delete	
  log	
  files	
  ,	
  binary	
  created	
  or	
  remove	
  
itself	
  	
  to	
  prevent	
  from	
  forensic	
  
•  It	
  is	
  useful	
  if	
  we	
  can	
  recover	
  files	
  deleted	
  by	
  malware	
  
Disk	
  Forensic	
  Arch.
Recover	
  Mechanism
•  In	
  sodware	
  approach	
  
– Basic	
  method	
  need	
  file	
  system’s	
  meta-­‐data	
  to	
  
recover	
  files	
  
– File	
  carving	
  is	
  proposed	
  to	
  recover	
  files	
  without	
  
file	
  system’s	
  meta-­‐data	
  
File	
  System	
  Data	
  Structure	
  
Filename
 Start	
  cluster
Recover.jpg
 Cluster	
  50
Hello.txt
 Cluster	
  53
Cluster	
  
number
Next	
  
cluster	
  
50
 51
51
 52
52
 EOF
53
 57
Recover.jpg	
  content
Recover.jpg	
  content
Recover.jpg	
  content
Hello.txt	
  content
Unknown
Cluster	
  50
Cluster	
  51
Cluster	
  52
Cluster	
  53
Cluster	
  54
Directory	
  Entry
File	
  Alloca+on	
  Table
Disk	
  Data	
  Area
15/14
Delete	
  a	
  File
Filename
 Start	
  cluster
_ecover.jpg
 Cluster	
  50
Hello.txt
 Cluster	
  53
Cluster	
  
number
Next	
  
cluster	
  
50
 0
51
 0
52
 0
53
 57
Recover.jpg	
  content
Recover.jpg	
  content
Recover.jpg	
  content
Hello.txt	
  content
Unknown
Cluster	
  50
Cluster	
  51
Cluster	
  52
Cluster	
  53
Cluster	
  54
Directory	
  Entry
File	
  Alloca+on	
  Table
Storage	
  Data	
  Area
16/14
Basic	
  Recover	
  Method
Filename
 Start	
  cluster
_ecover.jpg
 Cluster	
  50
Hello.txt
 Cluster	
  53
Recover.jpg	
  content
Recover.jpg	
  content
Recover.jpg	
  content
Hello.txt	
  content
Unknown
Cluster	
  50
Cluster	
  51
Cluster	
  52
Cluster	
  53
Cluster	
  54
Directory	
  Entry
File	
  Alloca+on	
  Table
Disk	
  Data	
  Area
Cluster	
  
number
Next	
  
cluster	
  
50
 0
51
 0
52
 0
53
 57
Predict	
  file	
  
allocate	
  in	
  
con+nues	
  
cluster
17/14
File	
  Carving	
  Method
Recover.jpg	
  content
Recover.jpg	
  content
Recover.jpg	
  content
Hello.txt	
  content
Unknown
Cluster	
  50
Cluster	
  51
Cluster	
  52
Cluster	
  53
Cluster	
  54
Storage	
  Data	
  Area
FF	
  D8	
  AA	
  BB	
  01	
  33....
...	
  70	
  BB	
  01	
  2A	
  FF	
  D9
JPEG	
  files	
  use	
  “FF	
  D8”	
  as	
  header	
  
and	
  “FF	
  D9”	
  as	
  footer
18/14
Recover	
  Result
Web	
  Crawler
•  To	
  collect	
  malware	
  across	
  the	
  web,	
  we	
  use	
  
crawler	
  to	
  automa+c	
  download	
  files	
  from	
  
internet	
  
– Nutch	
  	
  +	
  Hadoop	
  
– Collect	
  about	
  10000	
  files	
  1	
  /day	
  
•  Rarely	
  malicious	
  
– Not	
  run	
  javascript	
  
– No	
  vulnerability	
  
– Password
Malware	
  Sharing	
  Repository
•  There	
  are	
  many	
  website	
  provide	
  free	
  malware	
  
sharing	
  
–  ASack	
  Response	
  
•  Malc0de	
  
•  Malware	
  Black	
  List	
  
•  Malware	
  Domain	
  List	
  
–  Malware	
  Sharing	
  
•  VXHeaven	
  
•  Malware	
  Dump	
  
•  VirusSign	
  	
  
•  …….	
  
Malware	
  Profile
File	
  Metadata
File	
  Name
 	
  “setup.exe”
 Origin	
  File	
  Name

MD5(SHA1)	
  Hash
 ccffcb94e4058ed22a94881ba2
d26f35
File	
  Size
 65024
File	
  Type
 PE32	
  executable	
  for	
  MS	
  
Windows	
  (GUI)	
  Intel	
  80386	
  32-­‐
bit
IsMalicious
 True
 Some	
  of	
  our	
  source	
  may	
  
upload	
  benign	
  file
File	
  Source
Collec+on	
  Date
 2013-­‐11-­‐21
Collec+on	
  Source
 Email
 Email/Disk/Crawler/Honeypot
Collec+on	
  Loca+on
 bletchley@dsns.cs.nctu.edu.t
w
Email	
  address,	
  disk	
  id,	
  URL,	
  ip	
  
of	
  honeypot
Executable	
  Related	
  ASribute
Behavior
Network	
  Trace
 Log	
  All	
  Communica+on	
  
Flow	
  
Instruc+on	
  Trace
 Log	
  All	
  Instruc+on	
  
Executed
Func+on	
  Trace
 Log	
  All	
  API	
  func+on	
  code
Modified	
  Files
 All	
  Modified	
  Files
Shellcode
 Shellcode	
  iden+fied	
  in	
  Files
 (document	
  only)
Modified	
  Registry
 All	
  Registry	
  Modified	
  
SSDT	
  Hook
 If	
  SSDT	
  changed	
  by	
  this	
  sample
MBR	
  Modified
 If	
  this	
  sample	
  modified	
  MBR
Screenshots
Security	
  Detector	
  ASributed
An:Virus
Packer
 Packer	
  Name
 PEID
AV	
  Result
 All	
  an+virus	
  report
 ClamAV,	
  Kaspersky,	
  
Norton….
Other	
  Field	
  Needed	
  by	
  Each	
  Analyzer
Conclusion
•  Secmap	
  is	
  an	
  infrastructure	
  to	
  automa+c	
  
collect,	
  analysis	
  and	
  store	
  the	
  malware	
  sample	
  
•  Different	
  Way	
  to	
  collect	
  wide	
  range	
  of	
  
samples	
  
– Honeypot	
  
– Disk	
  
– Email	
  
– Web	
  
Q&A

More Related Content

PDF
Security events in 2014
PDF
Android Application Security
PDF
2012 S&P Paper Reading Session1
PDF
PPTX
External to DA, the OS X Way
PDF
The Dark Side of PowerShell by George Dobrea
PDF
Fruit vs Zombies: Defeat Non-jailbroken iOS Malware by Claud Xiao
PPTX
Lateral Movement - Phreaknik 2016
Security events in 2014
Android Application Security
2012 S&P Paper Reading Session1
External to DA, the OS X Way
The Dark Side of PowerShell by George Dobrea
Fruit vs Zombies: Defeat Non-jailbroken iOS Malware by Claud Xiao
Lateral Movement - Phreaknik 2016

What's hot (20)

PDF
CSW2017 Geshev+Miller logic bug hunting in chrome on android
PDF
CSW2017 Yuhao song+Huimingliu cyber_wmd_vulnerable_IoT
PDF
Defcon 22-zoltan-balazs-bypass-firewalls-application-whiteli
PDF
Threat Con 2021: What's Hitting my Honeypots
PDF
CSW2017 chuanda ding_state of windows application security
PDF
BlueHat v18 || Tales from the soc - real-world attacks seen through azure atp...
PDF
Lateral Movement: How attackers quietly traverse your Network
PPT
Attacking Automatic Wireless Network Selection
PDF
Defcon 22-wesley-mc grew-instrumenting-point-of-sale-malware
PDF
BlueHat v18 || Protecting the protector, hardening machine learning defenses ...
PPTX
Revealing the Attack Operations Targeting Japan by Shusei Tomonaga & Yuu Nak...
PDF
CNIT 129S: Ch 12: Attacking Users: Cross-Site Scripting
PPT
Penetration testing, What’s this?
PDF
Defcon 22-tim-mcguffin-one-man-shop
PDF
RIoT (Raiding Internet of Things) by Jacob Holcomb
PDF
How to measure your security response readiness?
PPT
iOS Application Pentesting
PDF
3. APTs Presentation
PDF
No Easy Breach DerbyCon 2016
PDF
Csw2017 bazhaniuk exploring_yoursystemdeeper_updated
CSW2017 Geshev+Miller logic bug hunting in chrome on android
CSW2017 Yuhao song+Huimingliu cyber_wmd_vulnerable_IoT
Defcon 22-zoltan-balazs-bypass-firewalls-application-whiteli
Threat Con 2021: What's Hitting my Honeypots
CSW2017 chuanda ding_state of windows application security
BlueHat v18 || Tales from the soc - real-world attacks seen through azure atp...
Lateral Movement: How attackers quietly traverse your Network
Attacking Automatic Wireless Network Selection
Defcon 22-wesley-mc grew-instrumenting-point-of-sale-malware
BlueHat v18 || Protecting the protector, hardening machine learning defenses ...
Revealing the Attack Operations Targeting Japan by Shusei Tomonaga & Yuu Nak...
CNIT 129S: Ch 12: Attacking Users: Cross-Site Scripting
Penetration testing, What’s this?
Defcon 22-tim-mcguffin-one-man-shop
RIoT (Raiding Internet of Things) by Jacob Holcomb
How to measure your security response readiness?
iOS Application Pentesting
3. APTs Presentation
No Easy Breach DerbyCon 2016
Csw2017 bazhaniuk exploring_yoursystemdeeper_updated
Ad

Similar to Malware collection and analysis (20)

PDF
Metasploitation part-1 (murtuja)
PDF
You need a PROcess to catch running processes and their modules_v2.0
PDF
Modern Reconnaissance Phase on APT - protection layer
PPTX
Malware Analysis 101: N00b to Ninja in 60 Minutes at BSidesDC on October 19, ...
PDF
A Threat Hunter Himself
PDF
A Threat Hunter Himself
PPTX
Sasa milic, cisco advanced malware protection
PPTX
Content Disarm Reconstruction and Cyber Kill Chain - Muhammad Sahputra
PPTX
Content Disarm Reconstruction & Cyber Kill Chain
PDF
Securing the Container Pipeline
PDF
Jaime Blasco - Fighting Advanced Persistent Threat (APT) with Open Source Too...
PDF
Software Analytics: Data Analytics for Software Engineering and Security
PPTX
Defending Your "Gold"
PDF
2023 NCIT: Introduction to Intrusion Detection
PDF
Attacking and Defending Mobile Applications
PDF
Super Easy Memory Forensics
 
PDF
Forensics perspective ERFA-møde marts 2017
PDF
FireSIGHT Management Center (FMC) slides
PDF
Drupal, lessons learnt from real world security incidents
PPTX
Protect Your Payloads: Modern Keying Techniques
Metasploitation part-1 (murtuja)
You need a PROcess to catch running processes and their modules_v2.0
Modern Reconnaissance Phase on APT - protection layer
Malware Analysis 101: N00b to Ninja in 60 Minutes at BSidesDC on October 19, ...
A Threat Hunter Himself
A Threat Hunter Himself
Sasa milic, cisco advanced malware protection
Content Disarm Reconstruction and Cyber Kill Chain - Muhammad Sahputra
Content Disarm Reconstruction & Cyber Kill Chain
Securing the Container Pipeline
Jaime Blasco - Fighting Advanced Persistent Threat (APT) with Open Source Too...
Software Analytics: Data Analytics for Software Engineering and Security
Defending Your "Gold"
2023 NCIT: Introduction to Intrusion Detection
Attacking and Defending Mobile Applications
Super Easy Memory Forensics
 
Forensics perspective ERFA-møde marts 2017
FireSIGHT Management Center (FMC) slides
Drupal, lessons learnt from real world security incidents
Protect Your Payloads: Modern Keying Techniques
Ad

More from Chong-Kuan Chen (13)

PDF
DARPA CGC and DEFCON CTF: Automatic Attack and Defense Technique
PDF
Compilation and Execution
PDF
Oram And Secure Computation
PDF
Mem forensic
PDF
Automatic tool for static analysis
PDF
Intro. to static analysis
PDF
Android system security
PDF
HITCON CTF 2014 BambooFox 解題心得分享
PDF
Inside the Matrix,How to Build Transparent Sandbox for Malware Analysis
PPTX
Become A Security Master
PDF
Malware Detection - A Machine Learning Perspective
PDF
Malware classification and detection
DARPA CGC and DEFCON CTF: Automatic Attack and Defense Technique
Compilation and Execution
Oram And Secure Computation
Mem forensic
Automatic tool for static analysis
Intro. to static analysis
Android system security
HITCON CTF 2014 BambooFox 解題心得分享
Inside the Matrix,How to Build Transparent Sandbox for Malware Analysis
Become A Security Master
Malware Detection - A Machine Learning Perspective
Malware classification and detection

Recently uploaded (20)

PDF
SM_6th-Sem__Cse_Internet-of-Things.pdf IOT
PPTX
CARTOGRAPHY AND GEOINFORMATION VISUALIZATION chapter1 NPTE (2).pptx
PPTX
CH1 Production IntroductoryConcepts.pptx
PPTX
UNIT 4 Total Quality Management .pptx
PPTX
Sustainable Sites - Green Building Construction
PPTX
Infosys Presentation by1.Riyan Bagwan 2.Samadhan Naiknavare 3.Gaurav Shinde 4...
PPTX
Foundation to blockchain - A guide to Blockchain Tech
PPTX
KTU 2019 -S7-MCN 401 MODULE 2-VINAY.pptx
PDF
composite construction of structures.pdf
PPTX
Geodesy 1.pptx...............................................
PPTX
Welding lecture in detail for understanding
PPTX
web development for engineering and engineering
PPT
Project quality management in manufacturing
PDF
PPT on Performance Review to get promotions
PPTX
Strings in CPP - Strings in C++ are sequences of characters used to store and...
PPTX
IOT PPTs Week 10 Lecture Material.pptx of NPTEL Smart Cities contd
PPTX
Engineering Ethics, Safety and Environment [Autosaved] (1).pptx
PPTX
FINAL REVIEW FOR COPD DIANOSIS FOR PULMONARY DISEASE.pptx
PPTX
additive manufacturing of ss316l using mig welding
PPTX
CYBER-CRIMES AND SECURITY A guide to understanding
SM_6th-Sem__Cse_Internet-of-Things.pdf IOT
CARTOGRAPHY AND GEOINFORMATION VISUALIZATION chapter1 NPTE (2).pptx
CH1 Production IntroductoryConcepts.pptx
UNIT 4 Total Quality Management .pptx
Sustainable Sites - Green Building Construction
Infosys Presentation by1.Riyan Bagwan 2.Samadhan Naiknavare 3.Gaurav Shinde 4...
Foundation to blockchain - A guide to Blockchain Tech
KTU 2019 -S7-MCN 401 MODULE 2-VINAY.pptx
composite construction of structures.pdf
Geodesy 1.pptx...............................................
Welding lecture in detail for understanding
web development for engineering and engineering
Project quality management in manufacturing
PPT on Performance Review to get promotions
Strings in CPP - Strings in C++ are sequences of characters used to store and...
IOT PPTs Week 10 Lecture Material.pptx of NPTEL Smart Cities contd
Engineering Ethics, Safety and Environment [Autosaved] (1).pptx
FINAL REVIEW FOR COPD DIANOSIS FOR PULMONARY DISEASE.pptx
additive manufacturing of ss316l using mig welding
CYBER-CRIMES AND SECURITY A guide to understanding

Malware collection and analysis

  • 1. Malware  Collec+on  and  Analysis C.K.Chen  @  DSNSLab,  NCTU   2014/05/20  
  • 2. DSNS   •  Boss   –  謝續平教授   •  IEEE  Fellow   •  ACM  Dis+nguished  Scien+st     •  國立交通大學資訊工程系特聘教授   •  資通安全研究與教學中心主任   •  法務部調查局顧問   •  實驗室研究方向   –  惡意程式分析   –  虛擬機器   –  數位鑑識   –  網路安全  
  • 3. Outline •  Rapid  Increasing  of  Malware   •  Secmap   –  Automa+c  Malware  Analysis  Cycle   –  High  Performance  and  Fault  Tolerance   –  Modula+on   •  Malware  Collec+on     –  Disk  Forensics   –  Email  ASachment   –  Web  Crawler   –  Malware  Sharing  Repository   –  Honey  Pot   •  Malware  ASributes     u  Note:  Some  part  of  this  slide  is  removed  due  to  research  is  under   processing.    
  • 4. Rapid  Increasing  of  Malware •  Malware  increasing McAfee  Labs  Threat  Report  in  Fourth  Quarter  2013
  • 5. Malware  Life  Cycle •  Malware  Life  Cycle  and  Response  Window hSp://www.fireeye.com/blog/corporate/2014/05/ghost-­‐hun+ng-­‐with-­‐ an+-­‐virus.html
  • 6. Malware  Analysis  Ecosystem     Internet •  Machine  Learning   •  System  Level  Virtual  Machine   •  Taint     •  Symbolic   •  Complex  Analysis •  Signature-­‐based  Detec+on   •  Classifier   •  Informa+on  Collec+on  &   Feedback Back-­‐end  Cloud Front-­‐end  Device 4.  Feedback  Info 3.  Update  Signature/Model 1.  Gathering  Sample 2.  Analysis
  • 7. SECMAP •  Scalable  sEcurity  Cloud-­‐compu+ng  for  Malware  Analysis   Pla_orm(SECMAP)   –  Aim  to  automa+c  whole  analysis  procedure   •  Malware  Collec+on   •  Malware  Storage   •  Malware  Analysis   •  Large  Scale  Data  Mining   –  Increase  throughput  with  high  performance  compu+ng   –  Decrease  overall  process  +me  to  shorten  response  window  
  • 9. Analyzers •  Malware  Behavior  Analyzer   •  Forensor   •  Malware  Func+on  Call  Trcer   •  Malware  Code  Block   Retriver   •  Instruc+on  Trace   •  Rootkit  Detec+on   •  ……..   •  ClamAV   •  Avira   •  Trend  Micro   •  Kaspaskey   •  VirusTotal
  • 11. Malware  Collec+on •  Malware  samples  can  help  to  construct  detec+on   model,  design  signature   •  Therefore,  we  use  following  way  to  collect   samples   –  HoneyPot   –  Web  Crawler   –  Shared  Repository   –  Email   –  Disk  Forensics   –  User  Upload
  • 12. Disk  Forensics •  When  host  are  infected,  disk  forensics  is  needed  to   discover  malware   –  Delete   –  Hidden   •  Dele+ng  file  is  one  of  important  behavior  of  malware   –  About  half  of  malware  delete  some  files  when  execu+on   –  Malware  oden  delete  log  files  ,  binary  created  or  remove   itself    to  prevent  from  forensic   •  It  is  useful  if  we  can  recover  files  deleted  by  malware  
  • 14. Recover  Mechanism •  In  sodware  approach   – Basic  method  need  file  system’s  meta-­‐data  to   recover  files   – File  carving  is  proposed  to  recover  files  without   file  system’s  meta-­‐data  
  • 15. File  System  Data  Structure   Filename Start  cluster Recover.jpg Cluster  50 Hello.txt Cluster  53 Cluster   number Next   cluster   50 51 51 52 52 EOF 53 57 Recover.jpg  content Recover.jpg  content Recover.jpg  content Hello.txt  content Unknown Cluster  50 Cluster  51 Cluster  52 Cluster  53 Cluster  54 Directory  Entry File  Alloca+on  Table Disk  Data  Area 15/14
  • 16. Delete  a  File Filename Start  cluster _ecover.jpg Cluster  50 Hello.txt Cluster  53 Cluster   number Next   cluster   50 0 51 0 52 0 53 57 Recover.jpg  content Recover.jpg  content Recover.jpg  content Hello.txt  content Unknown Cluster  50 Cluster  51 Cluster  52 Cluster  53 Cluster  54 Directory  Entry File  Alloca+on  Table Storage  Data  Area 16/14
  • 17. Basic  Recover  Method Filename Start  cluster _ecover.jpg Cluster  50 Hello.txt Cluster  53 Recover.jpg  content Recover.jpg  content Recover.jpg  content Hello.txt  content Unknown Cluster  50 Cluster  51 Cluster  52 Cluster  53 Cluster  54 Directory  Entry File  Alloca+on  Table Disk  Data  Area Cluster   number Next   cluster   50 0 51 0 52 0 53 57 Predict  file   allocate  in   con+nues   cluster 17/14
  • 18. File  Carving  Method Recover.jpg  content Recover.jpg  content Recover.jpg  content Hello.txt  content Unknown Cluster  50 Cluster  51 Cluster  52 Cluster  53 Cluster  54 Storage  Data  Area FF  D8  AA  BB  01  33.... ...  70  BB  01  2A  FF  D9 JPEG  files  use  “FF  D8”  as  header   and  “FF  D9”  as  footer 18/14
  • 20. Web  Crawler •  To  collect  malware  across  the  web,  we  use   crawler  to  automa+c  download  files  from   internet   – Nutch    +  Hadoop   – Collect  about  10000  files  1  /day   •  Rarely  malicious   – Not  run  javascript   – No  vulnerability   – Password
  • 21. Malware  Sharing  Repository •  There  are  many  website  provide  free  malware   sharing   –  ASack  Response   •  Malc0de   •  Malware  Black  List   •  Malware  Domain  List   –  Malware  Sharing   •  VXHeaven   •  Malware  Dump   •  VirusSign     •  …….  
  • 22. Malware  Profile File  Metadata File  Name  “setup.exe” Origin  File  Name MD5(SHA1)  Hash ccffcb94e4058ed22a94881ba2 d26f35 File  Size 65024 File  Type PE32  executable  for  MS   Windows  (GUI)  Intel  80386  32-­‐ bit IsMalicious True Some  of  our  source  may   upload  benign  file File  Source Collec+on  Date 2013-­‐11-­‐21 Collec+on  Source Email Email/Disk/Crawler/Honeypot Collec+on  Loca+on bletchley@dsns.cs.nctu.edu.t w Email  address,  disk  id,  URL,  ip   of  honeypot
  • 23. Executable  Related  ASribute Behavior Network  Trace Log  All  Communica+on   Flow   Instruc+on  Trace Log  All  Instruc+on   Executed Func+on  Trace Log  All  API  func+on  code Modified  Files All  Modified  Files Shellcode Shellcode  iden+fied  in  Files (document  only) Modified  Registry All  Registry  Modified   SSDT  Hook If  SSDT  changed  by  this  sample MBR  Modified If  this  sample  modified  MBR Screenshots
  • 24. Security  Detector  ASributed An:Virus Packer Packer  Name PEID AV  Result All  an+virus  report ClamAV,  Kaspersky,   Norton…. Other  Field  Needed  by  Each  Analyzer
  • 25. Conclusion •  Secmap  is  an  infrastructure  to  automa+c   collect,  analysis  and  store  the  malware  sample   •  Different  Way  to  collect  wide  range  of   samples   – Honeypot   – Disk   – Email   – Web  
  • 26. Q&A