SlideShare a Scribd company logo
Technical Workshop - Win32/Georbot Analysis
Introduction

•   Based in Montreal
•   Studies in computer engineering at Ecole Polytechnique
•   Malware analysis
•   Focus on investigation and understanding trends
Labs’ Objectives

• Gain hands-on knowledge on malware analysis
   • Obfuscation
   • Persistence
   • C&C traffic
• This case is *NOT* cutting edge but a good summary of common
  things we see nowadays
Win32/Georbot

• One of our analyst reported an interesting string in a binary
  (.gov.ge)
• Started investigation, we thought it was time sensitive and involved
  3 guys for 3 days.
• Interesting feature
   • Document stealing
   • Audio / Video capture
   • Etc
Win32/Georbot

• Further analysis showed thousands of variants
• We were able to track the evolution of the features
• Track AV evasion techniques
Win32/Georbot
Technical Workshop - Win32/Georbot Analysis
Workshop Outline

1.   Data obfuscation
2.   Control flow obfuscation
3.   API call obfuscation
4.   Answer basic malware analysis questions
5.   C&C network protocol
Tools Required

1. IDA 6.x (you can use the demo)
2. Python interpreter w/ some modules for web server
3. Immunity Debugger / Olly Debugger
IDA Python

•   Automate repetitive tasks in IDA
•   Read data (Byte, Word, Dword, etc)
•   Change data (PatchByte, PatchWord, PatchDword, etc)
•   Add comments (MakeComm)
•   Add cross references
•   User interaction
•   Etc.
Data Obfuscation

• Where’s all my data?!
• Debug the malware (in a controlled environment), do you see
  something appear? (0x407afb)
• What happened? Find the procedure which decodes the data
• Understand obfuscation
• Implement deobfuscation with IDA Python
Data Obfuscation
Control Flow Obfuscation
Control Flow Obfuscation

•   Identify common obfuscation patterns
•   Find a straight forward replacement
•   Implement substitutions with IDA Python
•   Reanalyze program, does it look better?
Control Flow Obfuscation


Obfuscated                     Deobfuscated
push <addr>; ret               Jmp <addr>
Push <addr>                    Call <addr> (will return to addr)
jmp <addr>
API Call Obfuscation

• Where are all my API calls?
• Find and understand hashing function
• Brute force API calls and add comments to IDB using IDA Python
API Hashing Function
Let’s understand what’s going on!

•   Can multiple instances of the malware run at the same time?
•   Is the malware persistent? How?
•   What is the command and control server?
•   What is the update mechanism for binaries?
•   Is there a C&C fallback mechanism?
Additional work

• Write a detection mechanism for an infected system
• Implement a cleaner for this malware
   • Kill the process
   • Remove persistence
• At what time interval does the malware probe its C&C server?
0x403AFD - cpuid




http://en.wikipedia.org/wiki/CPUID
C&C Protocol Analysis

•   What’s the chain of event in the communication
•   What is the information provided by the bot
•   What type of answer is the bot expecting?
•   What are the different actions?
C&C Commands

    0A029h ; find
    1675h ; dir
    0A8FEh ; load?
    22C4C1h ; upload
    42985 ; main?
    0A866h ; list?
    1175972831 ; upload_dir
    9C9Ch ; ddos
    0B01Dh ; scan
    47154 ; word
    2269271 ; system
    9FCCh ; dump
    310946 ; photo
    440F6h 18FEh ; rdp
    4F5BBh ; video
    3D0BD7C6h ; screenshot
    741334016 ; password
    0DA8B3Ch ; history
FALLBCK.com

• What is this DNS query?
• What can we do with it?
Technical Workshop - Win32/Georbot Analysis
GUID

• What is at 0x0040A03D, how is it used in program?
Conclusions

• The set of questions to answer is often similar.
• Don’t focus on details, remember your objective, its easy to get lost.
• A mix of dynamic and static analysis is often the best solution for
  quick understanding of a new malware family.
Thank You

More Related Content

PDF
BlueHat v18 || Protecting the protector, hardening machine learning defenses ...
PDF
Live in the ATM Trenches
PDF
Automatic tool for static analysis
PDF
Spo2 t19 spo2-t19
PDF
Analisis Estatico y de Comportamiento de un Binario Malicioso
PDF
PANDEMONIUM: Automated Identification of Cryptographic Algorithms using Dynam...
PDF
Defcon 22-wesley-mc grew-instrumenting-point-of-sale-malware
ODP
Malware analysis
BlueHat v18 || Protecting the protector, hardening machine learning defenses ...
Live in the ATM Trenches
Automatic tool for static analysis
Spo2 t19 spo2-t19
Analisis Estatico y de Comportamiento de un Binario Malicioso
PANDEMONIUM: Automated Identification of Cryptographic Algorithms using Dynam...
Defcon 22-wesley-mc grew-instrumenting-point-of-sale-malware
Malware analysis

What's hot (18)

PPTX
Revealing the Attack Operations Targeting Japan by Shusei Tomonaga & Yuu Nak...
PDF
Fantastic Red Team Attacks and How to Find Them
PDF
Defcon 22-philip-young-from-root-to-special-hacking-ibm-main
PDF
BlueHat v18 || Linear time shellcode detection using state machines and opera...
ODP
Metasploit Framework Executable Encoding
PPTX
Building next gen malware behavioural analysis environment
PDF
Defcon 22-zoltan-balazs-bypass-firewalls-application-whiteli
PDF
Network Forensics and Practical Packet Analysis
PPTX
Malware analysis
PDF
The Hunter Games: How to Find the Adversary with Event Query Language
PDF
CheckPlease: Payload-Agnostic Targeted Malware
ODP
C Cpres
PDF
Chapter 8 security tools ii
PPTX
Basic Malware Analysis
PPTX
Static code analysis
PDF
Isolating the Ghost in the Machine: Unveiling Post Exploitation Threatsrsac
PPT
The Future of Automated Malware Generation
PDF
Red Team Methodology - A Naked Look
Revealing the Attack Operations Targeting Japan by Shusei Tomonaga & Yuu Nak...
Fantastic Red Team Attacks and How to Find Them
Defcon 22-philip-young-from-root-to-special-hacking-ibm-main
BlueHat v18 || Linear time shellcode detection using state machines and opera...
Metasploit Framework Executable Encoding
Building next gen malware behavioural analysis environment
Defcon 22-zoltan-balazs-bypass-firewalls-application-whiteli
Network Forensics and Practical Packet Analysis
Malware analysis
The Hunter Games: How to Find the Adversary with Event Query Language
CheckPlease: Payload-Agnostic Targeted Malware
C Cpres
Chapter 8 security tools ii
Basic Malware Analysis
Static code analysis
Isolating the Ghost in the Machine: Unveiling Post Exploitation Threatsrsac
The Future of Automated Malware Generation
Red Team Methodology - A Naked Look
Ad

Viewers also liked (15)

PPTX
андрей дугин
PPTX
PPTX
как разработать защищенное веб приложение и не сойти с ума. владимир кочетков
PPTX
PPTX
E potseluevskaya ru
PPTX
V defense veniamin levtsov-kl_24 may 2013
PPTX
Phd2013 lyamin
PDF
24may 1000 valday sergey shekyan artem harutyunyan 'to watch or to be watched'
PPTX
23may 1500 valday трифаленков 'размещение приложений в облачной платформе о7 ...
PPTX
Дмитрий Кузнецов. Сертификация в странах CCRA глазами заявителя
PPT
Mobiles Can Make Your Business Fly
PPT
e is for everywhere - Interactive Mobile Web Presentation
PDF
Is that sense-able?
PPTX
2013 05-23 android&crypto
андрей дугин
как разработать защищенное веб приложение и не сойти с ума. владимир кочетков
E potseluevskaya ru
V defense veniamin levtsov-kl_24 may 2013
Phd2013 lyamin
24may 1000 valday sergey shekyan artem harutyunyan 'to watch or to be watched'
23may 1500 valday трифаленков 'размещение приложений в облачной платформе о7 ...
Дмитрий Кузнецов. Сертификация в странах CCRA глазами заявителя
Mobiles Can Make Your Business Fly
e is for everywhere - Interactive Mobile Web Presentation
Is that sense-able?
2013 05-23 android&crypto
Ad

Similar to Technical Workshop - Win32/Georbot Analysis (20)

PDF
[2011 CodeEngn Conference 05] Deok9 - DBI(Dynamic Binary Instrumentation)를 이용...
PPTX
ANALYZE'15 - Bulk Malware Analysis at Scale
PDF
Watchtowers of the Internet - Source Boston 2012
PPTX
NextGen Endpoint Security for Dummies
PDF
Defcon 22-wesley-mc grew-instrumenting-point-of-sale-malware
PPTX
Anti-virus Mechanisms and Various Ways to Bypass Antivirus detection
PDF
how-to-bypass-AM-PPL
PPTX
Filar seymour oreilly_bot_story_
PDF
Demystifying Binary Reverse Engineering - Pixels Camp
PDF
Tool Up Your LAMP Stack
PDF
Tool up your lamp stack
PDF
CSW2017 Yuhao song+Huimingliu cyber_wmd_vulnerable_IoT
PPTX
WTF is Penetration Testing v.2
PDF
DEEPSEC 2013: Malware Datamining And Attribution
PDF
Hacklu2011 tricaud
PDF
BSidesCharleston2014 - Ballin on a Budget: Tracking Chinese Malware Campaigns...
PDF
Commodity malware means YOU
PDF
(130119) #fitalk apt, cyber espionage threat
PDF
Big Data Approaches to Cloud Security
PPTX
Conclusions from Tracking Server Attacks at Scale
[2011 CodeEngn Conference 05] Deok9 - DBI(Dynamic Binary Instrumentation)를 이용...
ANALYZE'15 - Bulk Malware Analysis at Scale
Watchtowers of the Internet - Source Boston 2012
NextGen Endpoint Security for Dummies
Defcon 22-wesley-mc grew-instrumenting-point-of-sale-malware
Anti-virus Mechanisms and Various Ways to Bypass Antivirus detection
how-to-bypass-AM-PPL
Filar seymour oreilly_bot_story_
Demystifying Binary Reverse Engineering - Pixels Camp
Tool Up Your LAMP Stack
Tool up your lamp stack
CSW2017 Yuhao song+Huimingliu cyber_wmd_vulnerable_IoT
WTF is Penetration Testing v.2
DEEPSEC 2013: Malware Datamining And Attribution
Hacklu2011 tricaud
BSidesCharleston2014 - Ballin on a Budget: Tracking Chinese Malware Campaigns...
Commodity malware means YOU
(130119) #fitalk apt, cyber espionage threat
Big Data Approaches to Cloud Security
Conclusions from Tracking Server Attacks at Scale

More from Positive Hack Days (20)

PPTX
Инструмент ChangelogBuilder для автоматической подготовки Release Notes
PPTX
Как мы собираем проекты в выделенном окружении в Windows Docker
PPTX
Типовая сборка и деплой продуктов в Positive Technologies
PPTX
Аналитика в проектах: TFS + Qlik
PPTX
Использование анализатора кода SonarQube
PPTX
Развитие сообщества Open DevOps Community
PPTX
Методика определения неиспользуемых ресурсов виртуальных машин и автоматизаци...
PPTX
Автоматизация построения правил для Approof
PDF
Мастер-класс «Трущобы Application Security»
PDF
Формальные методы защиты приложений
PDF
Эвристические методы защиты приложений
PDF
Теоретические основы Application Security
PPTX
От экспериментального программирования к промышленному: путь длиной в 10 лет
PDF
Уязвимое Android-приложение: N проверенных способов наступить на грабли
PPTX
Требования по безопасности в архитектуре ПО
PDF
Формальная верификация кода на языке Си
PPTX
Механизмы предотвращения атак в ASP.NET Core
PDF
SOC для КИИ: израильский опыт
PDF
Honeywell Industrial Cyber Security Lab & Services Center
PDF
Credential stuffing и брутфорс-атаки
Инструмент ChangelogBuilder для автоматической подготовки Release Notes
Как мы собираем проекты в выделенном окружении в Windows Docker
Типовая сборка и деплой продуктов в Positive Technologies
Аналитика в проектах: TFS + Qlik
Использование анализатора кода SonarQube
Развитие сообщества Open DevOps Community
Методика определения неиспользуемых ресурсов виртуальных машин и автоматизаци...
Автоматизация построения правил для Approof
Мастер-класс «Трущобы Application Security»
Формальные методы защиты приложений
Эвристические методы защиты приложений
Теоретические основы Application Security
От экспериментального программирования к промышленному: путь длиной в 10 лет
Уязвимое Android-приложение: N проверенных способов наступить на грабли
Требования по безопасности в архитектуре ПО
Формальная верификация кода на языке Си
Механизмы предотвращения атак в ASP.NET Core
SOC для КИИ: израильский опыт
Honeywell Industrial Cyber Security Lab & Services Center
Credential stuffing и брутфорс-атаки

Recently uploaded (20)

PPTX
sap open course for s4hana steps from ECC to s4
PPTX
MYSQL Presentation for SQL database connectivity
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PPTX
20250228 LYD VKU AI Blended-Learning.pptx
PDF
Electronic commerce courselecture one. Pdf
PDF
KodekX | Application Modernization Development
PPTX
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
PPTX
Programs and apps: productivity, graphics, security and other tools
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
PPTX
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PDF
Approach and Philosophy of On baking technology
PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
PPTX
Understanding_Digital_Forensics_Presentation.pptx
PPTX
Cloud computing and distributed systems.
PPT
Teaching material agriculture food technology
PDF
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
PDF
Chapter 3 Spatial Domain Image Processing.pdf
PDF
Encapsulation theory and applications.pdf
sap open course for s4hana steps from ECC to s4
MYSQL Presentation for SQL database connectivity
Mobile App Security Testing_ A Comprehensive Guide.pdf
20250228 LYD VKU AI Blended-Learning.pptx
Electronic commerce courselecture one. Pdf
KodekX | Application Modernization Development
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
Programs and apps: productivity, graphics, security and other tools
Advanced methodologies resolving dimensionality complications for autism neur...
“AI and Expert System Decision Support & Business Intelligence Systems”
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
Approach and Philosophy of On baking technology
Reach Out and Touch Someone: Haptics and Empathic Computing
Understanding_Digital_Forensics_Presentation.pptx
Cloud computing and distributed systems.
Teaching material agriculture food technology
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
Chapter 3 Spatial Domain Image Processing.pdf
Encapsulation theory and applications.pdf

Technical Workshop - Win32/Georbot Analysis

  • 1. Technical Workshop - Win32/Georbot Analysis
  • 2. Introduction • Based in Montreal • Studies in computer engineering at Ecole Polytechnique • Malware analysis • Focus on investigation and understanding trends
  • 3. Labs’ Objectives • Gain hands-on knowledge on malware analysis • Obfuscation • Persistence • C&C traffic • This case is *NOT* cutting edge but a good summary of common things we see nowadays
  • 4. Win32/Georbot • One of our analyst reported an interesting string in a binary (.gov.ge) • Started investigation, we thought it was time sensitive and involved 3 guys for 3 days. • Interesting feature • Document stealing • Audio / Video capture • Etc
  • 5. Win32/Georbot • Further analysis showed thousands of variants • We were able to track the evolution of the features • Track AV evasion techniques
  • 8. Workshop Outline 1. Data obfuscation 2. Control flow obfuscation 3. API call obfuscation 4. Answer basic malware analysis questions 5. C&C network protocol
  • 9. Tools Required 1. IDA 6.x (you can use the demo) 2. Python interpreter w/ some modules for web server 3. Immunity Debugger / Olly Debugger
  • 10. IDA Python • Automate repetitive tasks in IDA • Read data (Byte, Word, Dword, etc) • Change data (PatchByte, PatchWord, PatchDword, etc) • Add comments (MakeComm) • Add cross references • User interaction • Etc.
  • 11. Data Obfuscation • Where’s all my data?! • Debug the malware (in a controlled environment), do you see something appear? (0x407afb) • What happened? Find the procedure which decodes the data • Understand obfuscation • Implement deobfuscation with IDA Python
  • 14. Control Flow Obfuscation • Identify common obfuscation patterns • Find a straight forward replacement • Implement substitutions with IDA Python • Reanalyze program, does it look better?
  • 15. Control Flow Obfuscation Obfuscated Deobfuscated push <addr>; ret Jmp <addr> Push <addr> Call <addr> (will return to addr) jmp <addr>
  • 16. API Call Obfuscation • Where are all my API calls? • Find and understand hashing function • Brute force API calls and add comments to IDB using IDA Python
  • 18. Let’s understand what’s going on! • Can multiple instances of the malware run at the same time? • Is the malware persistent? How? • What is the command and control server? • What is the update mechanism for binaries? • Is there a C&C fallback mechanism?
  • 19. Additional work • Write a detection mechanism for an infected system • Implement a cleaner for this malware • Kill the process • Remove persistence • At what time interval does the malware probe its C&C server?
  • 21. C&C Protocol Analysis • What’s the chain of event in the communication • What is the information provided by the bot • What type of answer is the bot expecting? • What are the different actions?
  • 22. C&C Commands 0A029h ; find 1675h ; dir 0A8FEh ; load? 22C4C1h ; upload 42985 ; main? 0A866h ; list? 1175972831 ; upload_dir 9C9Ch ; ddos 0B01Dh ; scan 47154 ; word 2269271 ; system 9FCCh ; dump 310946 ; photo 440F6h 18FEh ; rdp 4F5BBh ; video 3D0BD7C6h ; screenshot 741334016 ; password 0DA8B3Ch ; history
  • 23. FALLBCK.com • What is this DNS query? • What can we do with it?
  • 25. GUID • What is at 0x0040A03D, how is it used in program?
  • 26. Conclusions • The set of questions to answer is often similar. • Don’t focus on details, remember your objective, its easy to get lost. • A mix of dynamic and static analysis is often the best solution for quick understanding of a new malware family.