SlideShare a Scribd company logo
Visualizing your Honeypot Data
   Wasim Halani
    ◦ Security Analyst @ Network Intelligence India
      (http://www.niiconsulting.com/)
    ◦ Interests
      Exploit development
      Malware Analysis
   Harsh Patel
    ◦ Student @ Symbiosis center for Information
      technology.
    ◦ Interest
      Anything and everything about security
   A deliberately vulnerable system, placed on
    the network
    ◦ Lure attackers towards itself
    ◦ Capture the malwares sent to the network/system
    ◦ Help in offline analysis
   Types
    ◦ Low Interaction
    ◦ High Interaction
   NepenthesFE is a front end to the low
    interaction honeypot ‘nepenthes’

   Originally developed by Emre Bastuz

   Helps in cataloguing malware collected using
    nepenthes

   Has modules which performs operations to
    automate some aspects of malware analysis
   Our Nepenthes honeypot provided only
    minimal data about the captured binaries
    ◦   File hash (MD5)
    ◦   Attacker IP
    ◦   File Name
    ◦   ...
   What next?
   Is that all the value a honeypot can provide?
   Lenny Zeltser
    ◦ ‘What to include in a Malware Analysis Report?’
      http://zeltser.com/reverse-malware/malware-analysis-report.html

   Summary of Analysis
   Identification
   Characteristics
   Dependencies
   Behavioral & Code Analysis
   Screenshots
   Recommendations
   Once we have captured the binary, we’re still
    left with doing the routine basic stuff
    ◦ strings, file, virustotal, geo-ip ...


   Can’t we automate it!?

   Enter ‘NepenthesFE’
    ◦ Basic analysis like filetype, hashes, ASCII strings,
      packer information, geographical information
Analyzing malware sample
         ‘b.aaa’
   Provide a statistical output of data collected
    ◦ How many times has ‘a’ malware hit us?

   Provide visualization of origin of malware
    ◦ Which malwares originate from a single country

   To determine and focus on the number of new
    attacks on to the system

   Provide a framework to automate initial static
    analysis
    ◦ Is it packed?
    ◦ Any recognizable ASCII strings in the binary
Real-Time Static Malware Analysis using NepenthesFE
   Integrate with the Nepenthes honeypot
    ◦ Integration with multiple sensors possible
   Statistical count of malware hits
   AfterGlow diagrams
    ◦ Country of Origin
    ◦ ASN
   Provide details of the attacking IP
    ◦ GEO IP database
    ◦ Google maps
   Can be extended with custom modules for
    static malware analysis on real time
    ◦ Packer Information
    ◦ ‘Strings’

   Anti-virus scanning (for known malwares)
   Based on Sample (malware)
    ◦ VirusTotal Scanning
      API
    ◦ Bit defender scanning
    ◦ Unix based commands execution like File,
      objdump, UPX and string
    ◦ *nix based custom script execution to find out
      details like Packer Information, PE information
      and entropy analyser
   Based on Instance (Information about the
    attacker)
    ◦ GEO IP database
    ◦ ASN Information
      Mapping of ASN to Robtex
       Mapping of ASN to Phishtank
       Visualization of attack vectors from a ASN
        number
    ◦ Visualisation of attack vectors from a IP address
Real-Time Static Malware Analysis using NepenthesFE
Real-Time Static Malware Analysis using NepenthesFE
   Install Nepenthes Honeypot sensor
      http://nepenthes.carnivore.it/
   Refer to our first report at IHP
      http://www.honeynet.org.in/reports/KK_Project1.pdf
   List of packages are :-
    ◦   Build essentials
    ◦   Apache2
    ◦   Libapache2-mod-php5
    ◦   phppear
    ◦   Mysql-server-5.1
    ◦   Php5-msql
    ◦   Php5-mhash
    ◦   Php5-dev
    ◦   Upx-ucl
    ◦   File
   List of packages are :-
    ◦ geoip-bin
    ◦ rrdtool                       (for Graphs)
    ◦ Librrd2                       (for Graphs)
    ◦ Librrd2-dev                   (for Graphs)
    ◦ Python-pefile                 (for Pefile module)
    ◦ Python-all                    (for Pefile module)
    ◦ Bitdefender-scanner           (for bit-defender
      scanning)
    ◦ graphviz                      (for visualization)

    And Lots of Configuration....
   Modify the ‘submit-http.conf’ file in
    /etc/nepenthes
   Download the freely available database from
    MaxMind
    ◦ http://www.maxmind.com/download/geoip/database/GeoLiteCity.dat.gz
   Get the Google API Key
      http://code.google.com/apis/maps/signup.html
Real-Time Static Malware Analysis using NepenthesFE
   PEFile
    ◦ http://code.google.com/p/pefile/
   Packerid.py
    ◦ Requires ‘peid’ database (signatures)
    ◦ http://handlers.dshield.org/jclausing/
   UPX
    ◦ http://upx.sourceforge.net/
   ‘file’ : apt-get install file
   ‘strings’
   ‘obj-jump’
   These executeables (chmod +x) should be accessible to
    NFE
    ◦ Place them in /usr/bin/ folder if needed
Analysis Report        Nepenthes             Nepenthes + FE


File name                 Yes           Yes


Unique Identification –   MD5,SHA512    MD5, SHA512, (possibly ssdeep)
Hashes
Malware Name (Family)     No            VirusTotal, Bitdefender (free Linux
                                        AV scanners)
Binary File Type          No            ‘file’

Malware Origin            IP address    Geo-location data


Screenshots               None          GoogleMaps, AfterGlow graphs,
                                        Robtex graphs
Is it packed? Which       No            packerid.py, UPX
Packer?
Statistics                No            Yes (hit counts,RRD graphs)
   Analyzing malware sample‘b.aaa’
Real-Time Static Malware Analysis using NepenthesFE
Real-Time Static Malware Analysis using NepenthesFE
Real-Time Static Malware Analysis using NepenthesFE
Real-Time Static Malware Analysis using NepenthesFE
Real-Time Static Malware Analysis using NepenthesFE
   Works only with Nepenthes honeypot 

   No search functionality

   VirusTotal functionality is broken (new API
    released by VT recently)

   Report cannot be exported
   Open-source
    ◦ Requires volunteers
    ◦ Current version – 0.04 (Releasing v0.05 today)
   Complete documentation available at:
    ◦ http://www.niiconsulting.com/nepenthesfe/
   Implementation of a central NepenthesFE for
    multiple Nepenthes sensors
    ◦ As part of the Indian Honeynet Project (IHP)
      http://honeynet.org.in/
   Submit the malware to a sandbox environment to
    retrieve more in-depth analysis
Real-Time Static Malware Analysis using NepenthesFE
wasimhalani@gmail.com
 har.duro@gmail.com

More Related Content

PPT
Backtrack os 5
PPTX
Malware Analysis 101 - N00b to Ninja in 60 Minutes at CactusCon on April 4, 2014
PDF
Di shen pacsec_final
PPT
Malware Analysis Made Simple
PDF
Suricata
PPTX
Introduction to Dynamic Malware Analysis ...Or am I "Cuckoo for Malware?"
PDF
Automated Malware Analysis and Cyber Security Intelligence
PPTX
Malware Analysis 101 - N00b to Ninja in 60 Minutes at BSidesLV on August 5, ...
Backtrack os 5
Malware Analysis 101 - N00b to Ninja in 60 Minutes at CactusCon on April 4, 2014
Di shen pacsec_final
Malware Analysis Made Simple
Suricata
Introduction to Dynamic Malware Analysis ...Or am I "Cuckoo for Malware?"
Automated Malware Analysis and Cyber Security Intelligence
Malware Analysis 101 - N00b to Ninja in 60 Minutes at BSidesLV on August 5, ...

What's hot (20)

PPTX
Malware Analysis 101: N00b to Ninja in 60 Minutes at BSidesDC on October 19, ...
PDF
[CLASS 2014] Palestra Técnica - Jonathan Knudsen
PDF
Introduction to Snort Rule Writing
PDF
Web Application Security Testing: Kali Linux Is the Way to Go
PPTX
Malware Analysis 101 - N00b to Ninja in 60 Minutes at Notacon on April 12, 2014
PDF
Shusei tomonaga pac_sec_20171026
PDF
Tick group @avar2019 20191111 cha minseok_publish
PPT
Linux Virus
PDF
Embedded linux 악성코드 동향 20150323 v1.0 공개판
PPTX
Malware analysis
PDF
Hack Attack! An Introduction to Penetration Testing
PPTX
Basic Malware Analysis
PDF
Suricata: A Decade Under the Influence (of packet sniffing)
PPTX
Bsides detroit 2013 honeypots
PPTX
Bsides chicago 2013 honeypots
PPTX
Rooted2020 roapt evil-mass_storage_-_tu-ya_aqui_-_david_reguera_-_abel_valero
ODP
Malware analysis - What to learn from your invaders
PPTX
My Bro The ELK
PPTX
Hunting for APT in network logs workshop presentation
PDF
BlueHat v18 || Linear time shellcode detection using state machines and opera...
Malware Analysis 101: N00b to Ninja in 60 Minutes at BSidesDC on October 19, ...
[CLASS 2014] Palestra Técnica - Jonathan Knudsen
Introduction to Snort Rule Writing
Web Application Security Testing: Kali Linux Is the Way to Go
Malware Analysis 101 - N00b to Ninja in 60 Minutes at Notacon on April 12, 2014
Shusei tomonaga pac_sec_20171026
Tick group @avar2019 20191111 cha minseok_publish
Linux Virus
Embedded linux 악성코드 동향 20150323 v1.0 공개판
Malware analysis
Hack Attack! An Introduction to Penetration Testing
Basic Malware Analysis
Suricata: A Decade Under the Influence (of packet sniffing)
Bsides detroit 2013 honeypots
Bsides chicago 2013 honeypots
Rooted2020 roapt evil-mass_storage_-_tu-ya_aqui_-_david_reguera_-_abel_valero
Malware analysis - What to learn from your invaders
My Bro The ELK
Hunting for APT in network logs workshop presentation
BlueHat v18 || Linear time shellcode detection using state machines and opera...
Ad

Similar to Real-Time Static Malware Analysis using NepenthesFE (20)

PDF
Zen and the art of collecting and analyzing malware
PDF
Malware Analysis -an overview by PP Singh
PDF
'Malware Analysis' by PP Singh
PPTX
revisedhoneypot429
PDF
Modern malware and threats
PDF
H@dfex 2015 malware analysis
PDF
Modern Malware and Threats
PDF
BSidesCharleston2014 - Ballin on a Budget: Tracking Chinese Malware Campaigns...
PPT
Security & ethical hacking
PDF
Project in malware analysis:C2C
PDF
Computer security
PDF
[CONFidence 2016] Leszek Miś - Honey(pot) flavored hunt for cyber enemy
PDF
Honeypots: Visão Geral
PPT
Security & ethical hacking p2
PDF
RenasCON 2023: Learning from honeypots
PDF
Ethical hacking with Python tools
PPTX
DC612 Day - Hands on Penetration Testing 101
PDF
Malware collection and analysis
DOCX
Malware analysis and forensic analysis of images
PPTX
Exploring Kali Linux Tools for Website Scanning via IP Address
Zen and the art of collecting and analyzing malware
Malware Analysis -an overview by PP Singh
'Malware Analysis' by PP Singh
revisedhoneypot429
Modern malware and threats
H@dfex 2015 malware analysis
Modern Malware and Threats
BSidesCharleston2014 - Ballin on a Budget: Tracking Chinese Malware Campaigns...
Security & ethical hacking
Project in malware analysis:C2C
Computer security
[CONFidence 2016] Leszek Miś - Honey(pot) flavored hunt for cyber enemy
Honeypots: Visão Geral
Security & ethical hacking p2
RenasCON 2023: Learning from honeypots
Ethical hacking with Python tools
DC612 Day - Hands on Penetration Testing 101
Malware collection and analysis
Malware analysis and forensic analysis of images
Exploring Kali Linux Tools for Website Scanning via IP Address
Ad

Recently uploaded (20)

PDF
Review of recent advances in non-invasive hemoglobin estimation
PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
PDF
Unlocking AI with Model Context Protocol (MCP)
PDF
Network Security Unit 5.pdf for BCA BBA.
PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
PPT
Teaching material agriculture food technology
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PPTX
MYSQL Presentation for SQL database connectivity
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PDF
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
PDF
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PPTX
Understanding_Digital_Forensics_Presentation.pptx
PDF
Approach and Philosophy of On baking technology
PDF
Spectral efficient network and resource selection model in 5G networks
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PPTX
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
PPTX
Cloud computing and distributed systems.
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PDF
KodekX | Application Modernization Development
Review of recent advances in non-invasive hemoglobin estimation
Dropbox Q2 2025 Financial Results & Investor Presentation
Unlocking AI with Model Context Protocol (MCP)
Network Security Unit 5.pdf for BCA BBA.
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
Teaching material agriculture food technology
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
MYSQL Presentation for SQL database connectivity
Mobile App Security Testing_ A Comprehensive Guide.pdf
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
Advanced methodologies resolving dimensionality complications for autism neur...
Understanding_Digital_Forensics_Presentation.pptx
Approach and Philosophy of On baking technology
Spectral efficient network and resource selection model in 5G networks
Per capita expenditure prediction using model stacking based on satellite ima...
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
Cloud computing and distributed systems.
Diabetes mellitus diagnosis method based random forest with bat algorithm
KodekX | Application Modernization Development

Real-Time Static Malware Analysis using NepenthesFE

  • 2. Wasim Halani ◦ Security Analyst @ Network Intelligence India (http://www.niiconsulting.com/) ◦ Interests  Exploit development  Malware Analysis  Harsh Patel ◦ Student @ Symbiosis center for Information technology. ◦ Interest  Anything and everything about security
  • 3. A deliberately vulnerable system, placed on the network ◦ Lure attackers towards itself ◦ Capture the malwares sent to the network/system ◦ Help in offline analysis  Types ◦ Low Interaction ◦ High Interaction
  • 4. NepenthesFE is a front end to the low interaction honeypot ‘nepenthes’  Originally developed by Emre Bastuz  Helps in cataloguing malware collected using nepenthes  Has modules which performs operations to automate some aspects of malware analysis
  • 5. Our Nepenthes honeypot provided only minimal data about the captured binaries ◦ File hash (MD5) ◦ Attacker IP ◦ File Name ◦ ...  What next?  Is that all the value a honeypot can provide?
  • 6. Lenny Zeltser ◦ ‘What to include in a Malware Analysis Report?’  http://zeltser.com/reverse-malware/malware-analysis-report.html  Summary of Analysis  Identification  Characteristics  Dependencies  Behavioral & Code Analysis  Screenshots  Recommendations
  • 7. Once we have captured the binary, we’re still left with doing the routine basic stuff ◦ strings, file, virustotal, geo-ip ...  Can’t we automate it!?  Enter ‘NepenthesFE’ ◦ Basic analysis like filetype, hashes, ASCII strings, packer information, geographical information
  • 9. Provide a statistical output of data collected ◦ How many times has ‘a’ malware hit us?  Provide visualization of origin of malware ◦ Which malwares originate from a single country  To determine and focus on the number of new attacks on to the system  Provide a framework to automate initial static analysis ◦ Is it packed? ◦ Any recognizable ASCII strings in the binary
  • 11. Integrate with the Nepenthes honeypot ◦ Integration with multiple sensors possible  Statistical count of malware hits  AfterGlow diagrams ◦ Country of Origin ◦ ASN  Provide details of the attacking IP ◦ GEO IP database ◦ Google maps
  • 12. Can be extended with custom modules for static malware analysis on real time ◦ Packer Information ◦ ‘Strings’  Anti-virus scanning (for known malwares)
  • 13. Based on Sample (malware) ◦ VirusTotal Scanning  API ◦ Bit defender scanning ◦ Unix based commands execution like File, objdump, UPX and string ◦ *nix based custom script execution to find out details like Packer Information, PE information and entropy analyser
  • 14. Based on Instance (Information about the attacker) ◦ GEO IP database ◦ ASN Information  Mapping of ASN to Robtex  Mapping of ASN to Phishtank  Visualization of attack vectors from a ASN number ◦ Visualisation of attack vectors from a IP address
  • 17. Install Nepenthes Honeypot sensor  http://nepenthes.carnivore.it/  Refer to our first report at IHP  http://www.honeynet.org.in/reports/KK_Project1.pdf
  • 18. List of packages are :- ◦ Build essentials ◦ Apache2 ◦ Libapache2-mod-php5 ◦ phppear ◦ Mysql-server-5.1 ◦ Php5-msql ◦ Php5-mhash ◦ Php5-dev ◦ Upx-ucl ◦ File
  • 19. List of packages are :- ◦ geoip-bin ◦ rrdtool (for Graphs) ◦ Librrd2 (for Graphs) ◦ Librrd2-dev (for Graphs) ◦ Python-pefile (for Pefile module) ◦ Python-all (for Pefile module) ◦ Bitdefender-scanner (for bit-defender scanning) ◦ graphviz (for visualization) And Lots of Configuration....
  • 20. Modify the ‘submit-http.conf’ file in /etc/nepenthes
  • 21. Download the freely available database from MaxMind ◦ http://www.maxmind.com/download/geoip/database/GeoLiteCity.dat.gz
  • 22. Get the Google API Key  http://code.google.com/apis/maps/signup.html
  • 24. PEFile ◦ http://code.google.com/p/pefile/  Packerid.py ◦ Requires ‘peid’ database (signatures) ◦ http://handlers.dshield.org/jclausing/  UPX ◦ http://upx.sourceforge.net/  ‘file’ : apt-get install file  ‘strings’  ‘obj-jump’  These executeables (chmod +x) should be accessible to NFE ◦ Place them in /usr/bin/ folder if needed
  • 25. Analysis Report Nepenthes Nepenthes + FE File name Yes Yes Unique Identification – MD5,SHA512 MD5, SHA512, (possibly ssdeep) Hashes Malware Name (Family) No VirusTotal, Bitdefender (free Linux AV scanners) Binary File Type No ‘file’ Malware Origin IP address Geo-location data Screenshots None GoogleMaps, AfterGlow graphs, Robtex graphs Is it packed? Which No packerid.py, UPX Packer? Statistics No Yes (hit counts,RRD graphs)
  • 26. Analyzing malware sample‘b.aaa’
  • 32. Works only with Nepenthes honeypot   No search functionality  VirusTotal functionality is broken (new API released by VT recently)  Report cannot be exported
  • 33. Open-source ◦ Requires volunteers ◦ Current version – 0.04 (Releasing v0.05 today)  Complete documentation available at: ◦ http://www.niiconsulting.com/nepenthesfe/  Implementation of a central NepenthesFE for multiple Nepenthes sensors ◦ As part of the Indian Honeynet Project (IHP)  http://honeynet.org.in/  Submit the malware to a sandbox environment to retrieve more in-depth analysis