77
Malware APA Professional Center Mohammad Reza Faghani

Malware APA Professional Center Mohammad Reza Faghani APA Professional Center Mohammad Reza Faghani

Embed Size (px)

Citation preview

Page 1: Malware APA Professional Center Mohammad Reza Faghani APA Professional Center Mohammad Reza Faghani

MalwareMalwareAPA Professional Center

Mohammad Reza FaghaniAPA Professional Center

Mohammad Reza Faghani

Page 2: Malware APA Professional Center Mohammad Reza Faghani APA Professional Center Mohammad Reza Faghani

Welcome to the zoo

• What malware are

• How do they infect hosts

• How do they hide

• How do they propagate

• Zoo visit !

• How to detect them

• Worms

Page 3: Malware APA Professional Center Mohammad Reza Faghani APA Professional Center Mohammad Reza Faghani

What is a malware ?

• A Malware is a set of instructions that run on your computer and make your system do something that an attacker wants it to do.

Page 4: Malware APA Professional Center Mohammad Reza Faghani APA Professional Center Mohammad Reza Faghani

What it is good for ?

• Steal personal information

• Delete files

• Click fraud

• Steal software serial numbers

• Use your computer as relay

Page 5: Malware APA Professional Center Mohammad Reza Faghani APA Professional Center Mohammad Reza Faghani

The Malware Zoo

• Virus

• Backdoor

• Trojan horse

• Rootkit

• Scareware

• Adware

• Worm

Page 6: Malware APA Professional Center Mohammad Reza Faghani APA Professional Center Mohammad Reza Faghani

What is a Virus ?

• a program that can infect other programs by modifying them to include a, possibly evolved, version of itself

• Fred Cohen 1983

Page 7: Malware APA Professional Center Mohammad Reza Faghani APA Professional Center Mohammad Reza Faghani

What is a trojan

A trojan describes the class of malware that appears to perform a desirable

function but in fact performs undisclosed malicious functions that allow

unauthorized access to the victim computer

Wikipedia

Page 8: Malware APA Professional Center Mohammad Reza Faghani APA Professional Center Mohammad Reza Faghani

What is rootkit

• A root kit is a component that uses stealth to maintain a persistent and undetectable presence on the machine

• Symantec

Page 9: Malware APA Professional Center Mohammad Reza Faghani APA Professional Center Mohammad Reza Faghani

What is a worm

A computer worm is a self-replicating computer program. It uses a network to send copies of itself to other nodes and

do so without any user intervention.

Page 10: Malware APA Professional Center Mohammad Reza Faghani APA Professional Center Mohammad Reza Faghani

Almost 30 years of Malware

• From Malware fighting malicious code

Page 11: Malware APA Professional Center Mohammad Reza Faghani APA Professional Center Mohammad Reza Faghani

Number of malware signatures

Symantec report 2009

Page 12: Malware APA Professional Center Mohammad Reza Faghani APA Professional Center Mohammad Reza Faghani

Malware Repartition

Panda Q1 report 2009

Page 13: Malware APA Professional Center Mohammad Reza Faghani APA Professional Center Mohammad Reza Faghani

Infection methodsInfection methods

Page 14: Malware APA Professional Center Mohammad Reza Faghani APA Professional Center Mohammad Reza Faghani

Outline

• What malware are

• How do they infect hosts

• How do they propagate

• Zoo visit !

• How to detect them

• Worms

Page 15: Malware APA Professional Center Mohammad Reza Faghani APA Professional Center Mohammad Reza Faghani

What to Infect

• Executable

• Interpreted file

• Kernel

• Service

• MBR

• Hypervisor

Page 16: Malware APA Professional Center Mohammad Reza Faghani APA Professional Center Mohammad Reza Faghani

Overwriting malware

TargetedTargetedExecutablExecutabl

eeMalwareMalwareMalwareMalware

Page 17: Malware APA Professional Center Mohammad Reza Faghani APA Professional Center Mohammad Reza Faghani

prepending malware

TargetedTargetedExecutablExecutabl

ee

MalwareMalware

Infected Infected hosthost

ExecutablExecutablee

MalwareMalware

Page 18: Malware APA Professional Center Mohammad Reza Faghani APA Professional Center Mohammad Reza Faghani

appending malware

TargetedTargetedExecutablExecutabl

ee

MalwareMalware

InfectedInfectedhosthost

ExecutablExecutablee

MalwareMalware

Page 19: Malware APA Professional Center Mohammad Reza Faghani APA Professional Center Mohammad Reza Faghani

Cavity malware

TargetedTargetedExecutablExecutabl

eeInfected Infected

hosthostExecutablExecutabl

ee

MalwareMalwareMalwareMalware

Page 20: Malware APA Professional Center Mohammad Reza Faghani APA Professional Center Mohammad Reza Faghani

Multi-Cavity malware

TargetedTargetedExecutablExecutabl

eeMalwareMalware

MalwareMalware

MalwareMalware

MalwareMalware

Page 21: Malware APA Professional Center Mohammad Reza Faghani APA Professional Center Mohammad Reza Faghani

Packers

MalwarMalwaree

Infected hostInfected hostExecutableExecutable

PackerPacker

Payload

Page 22: Malware APA Professional Center Mohammad Reza Faghani APA Professional Center Mohammad Reza Faghani

Packer functionalities

• Compress

• Encrypt

• Randomize (polymorphism)

• Anti-debug technique (fake jmp)

• Add-junk

• Anti-VM

Page 23: Malware APA Professional Center Mohammad Reza Faghani APA Professional Center Mohammad Reza Faghani

Auto start

• Folder auto-start : C:\Documents and Settings\[user_name]\Start

Menu\Programs\Startup

• Win.ini : run=[backdoor]" or "load=[backdoor]".

• System.ini : shell=”myexplorer.exe”

• Wininit

• Config.sys

Page 24: Malware APA Professional Center Mohammad Reza Faghani APA Professional Center Mohammad Reza Faghani

Auto start cont.

• Assign know extension (.doc) to the malware

• Add a Registry key such as HKCU\

SOFTWARE\Microsoft\Windows \CurrentVersion\Run

• Add a task in the task scheduler

• Run as service

Page 25: Malware APA Professional Center Mohammad Reza Faghani APA Professional Center Mohammad Reza Faghani

Document based malware

• MS Office

• Open Office

• Acrobat

Page 26: Malware APA Professional Center Mohammad Reza Faghani APA Professional Center Mohammad Reza Faghani

Subverting the Kernel

• Kernel task

• Process management

• File access

• Memory management

• Network management

What to hide

➡Process

➡Files

➡Network traffic

Page 27: Malware APA Professional Center Mohammad Reza Faghani APA Professional Center Mohammad Reza Faghani

MBR/Bootkit

• Bootkits can be used to avoid all protections of an OS, because OS consider that the system was in trusted stated at the moment the OS boot loader took control.

Page 28: Malware APA Professional Center Mohammad Reza Faghani APA Professional Center Mohammad Reza Faghani

Vboot

• Work on every Windows (vista,7)

• 3ko

• Bypass checks by letting them run and then do inflight patching

• Communicate via ping

Page 29: Malware APA Professional Center Mohammad Reza Faghani APA Professional Center Mohammad Reza Faghani

PropagationVector

PropagationVector

Page 30: Malware APA Professional Center Mohammad Reza Faghani APA Professional Center Mohammad Reza Faghani

Outline

• What malware are

• How do they infect hosts

• How do they propagate

• Zoo visit !

• How to detect them

• Worms

Page 31: Malware APA Professional Center Mohammad Reza Faghani APA Professional Center Mohammad Reza Faghani

Shared folder

Page 32: Malware APA Professional Center Mohammad Reza Faghani APA Professional Center Mohammad Reza Faghani

Email propagation

• from pandalab blog

Page 33: Malware APA Professional Center Mohammad Reza Faghani APA Professional Center Mohammad Reza Faghani

Valentine day ...

• Waledac malicious domain from pandalab blog

Page 34: Malware APA Professional Center Mohammad Reza Faghani APA Professional Center Mohammad Reza Faghani

Fake codec

QuickTime™ and aGIF decompressor

are needed to see this picture.

Page 35: Malware APA Professional Center Mohammad Reza Faghani APA Professional Center Mohammad Reza Faghani

Fake antivirus

• from pandalab blog

Page 36: Malware APA Professional Center Mohammad Reza Faghani APA Professional Center Mohammad Reza Faghani

Hijack you browser

• from pandalab blog

Page 37: Malware APA Professional Center Mohammad Reza Faghani APA Professional Center Mohammad Reza Faghani

Fake page !

• from pandalab blog

Page 38: Malware APA Professional Center Mohammad Reza Faghani APA Professional Center Mohammad Reza Faghani

P2P Files

• Popular query

• 35.5% are malwares (Kalafut 2006)

Page 39: Malware APA Professional Center Mohammad Reza Faghani APA Professional Center Mohammad Reza Faghani

BackdoorBackdoor

Page 40: Malware APA Professional Center Mohammad Reza Faghani APA Professional Center Mohammad Reza Faghani

Basic

InfectedInfectedHostHost

AttackeAttackerr

TCP

Page 41: Malware APA Professional Center Mohammad Reza Faghani APA Professional Center Mohammad Reza Faghani

Reverse

InfectedInfectedHostHost

AttackeAttackerr

TCP

Page 42: Malware APA Professional Center Mohammad Reza Faghani APA Professional Center Mohammad Reza Faghani

Rendez vous backdoor

InfectedInfectedHostHost

AttackeAttackerr

RDVRDVPointPoint

Page 43: Malware APA Professional Center Mohammad Reza Faghani APA Professional Center Mohammad Reza Faghani

Outline

• What malware are

• How do they infect hosts

• How do they propagate

• Zoo visit !

• How to detect them

• Worms

Page 44: Malware APA Professional Center Mohammad Reza Faghani APA Professional Center Mohammad Reza Faghani

Adware

Page 45: Malware APA Professional Center Mohammad Reza Faghani APA Professional Center Mohammad Reza Faghani

BackOrifice

• Defcon 1998

• new version in 2000

Page 46: Malware APA Professional Center Mohammad Reza Faghani APA Professional Center Mohammad Reza Faghani

Netbus

• 1998

• Used for “prank”

Page 47: Malware APA Professional Center Mohammad Reza Faghani APA Professional Center Mohammad Reza Faghani

Symantec pcAnywhere

Page 48: Malware APA Professional Center Mohammad Reza Faghani APA Professional Center Mohammad Reza Faghani

Browser Toolbar ...

Page 49: Malware APA Professional Center Mohammad Reza Faghani APA Professional Center Mohammad Reza Faghani

Toolbar again

Page 50: Malware APA Professional Center Mohammad Reza Faghani APA Professional Center Mohammad Reza Faghani

Ransomware

• Trj/SMSlock.A

• Russian ransomware

• April 2009To unlock you need to send an SMS with the text4121800286to the number3649Enter the

resulting code:Any attempt to reinstall the system may lead to loss of important information and

computer damage

from pandalab blog

Page 51: Malware APA Professional Center Mohammad Reza Faghani APA Professional Center Mohammad Reza Faghani

DetectionDetection

Page 52: Malware APA Professional Center Mohammad Reza Faghani APA Professional Center Mohammad Reza Faghani

Outline

• What malware are

• How do they infect hosts

• How do they propagate

• Zoo visit !

• How to detect them

• Worms

Page 53: Malware APA Professional Center Mohammad Reza Faghani APA Professional Center Mohammad Reza Faghani

Anti-virus

• Analyze system behavior

• Analyze binary to decide if it a virus

• Type :

• Scanner

• Real time monitor

Page 54: Malware APA Professional Center Mohammad Reza Faghani APA Professional Center Mohammad Reza Faghani

Impossibility result

• It is not possible to build a perfect virus/malware detector (Cohen)

Page 55: Malware APA Professional Center Mohammad Reza Faghani APA Professional Center Mohammad Reza Faghani

Impossibility result

• Diagonal argument

• P is a perfect detection program

• V is a virus

• V can call P

• if P(V) = true -> halt

• if P(V) = false -> spread

Page 56: Malware APA Professional Center Mohammad Reza Faghani APA Professional Center Mohammad Reza Faghani

Virus signature

• Find a string that can identify the virus

• Fingerprint like

Page 57: Malware APA Professional Center Mohammad Reza Faghani APA Professional Center Mohammad Reza Faghani

Heuristics

• Analyze program behavior

• Network access

• File open

• Attempt to delete file

• Attempt to modify the boot sector

Page 58: Malware APA Professional Center Mohammad Reza Faghani APA Professional Center Mohammad Reza Faghani

Checksum

• Compute a checksum for

• Good binary

• Configuration file

• Detect change by comparing checksum

• At some point there will more malware than “goodware” ...

Page 59: Malware APA Professional Center Mohammad Reza Faghani APA Professional Center Mohammad Reza Faghani

Sandbox analysis

• Running the executable in a VM

• Observe it

• File activity

• Network

• Memory

Page 60: Malware APA Professional Center Mohammad Reza Faghani APA Professional Center Mohammad Reza Faghani

Dealing with Packer

• Launch the exe

• Wait until it is unpack

• Dump the memory

Page 61: Malware APA Professional Center Mohammad Reza Faghani APA Professional Center Mohammad Reza Faghani

WormsWorms

Page 62: Malware APA Professional Center Mohammad Reza Faghani APA Professional Center Mohammad Reza Faghani

Outline

• What malware are

• How do they infect hosts

• How do they propagate

• Zoo visit !

• How to detect them

• Worms

Page 63: Malware APA Professional Center Mohammad Reza Faghani APA Professional Center Mohammad Reza Faghani

63

Worm

A worm is self-replicating software designed to spread through the network Typically, exploit security flaws in widely used services

Can cause enormous damage

Launch DDOS attacks, install bot networks

Access sensitive information

Cause confusion by corrupting the sensitive information

Worm vs Virus vs Trojan horse A virus is code embedded in a file or program

Viruses and Trojan horses rely on human intervention

Worms are self-contained and may spread autonomously

Page 64: Malware APA Professional Center Mohammad Reza Faghani APA Professional Center Mohammad Reza Faghani

64

Cost of worm attacks

Morris worm, 1988

Infected approximately 6,000 machines

10% of computers connected to the Internet

cost ~ $10 million in downtime and cleanup

Code Red worm, July 16 2001

Direct descendant of Morris’ worm

Infected more than 500,000 servers

Programmed to go into infinite sleep mode July 28

Caused ~ $2.6 Billion in damages,

Love Bug worm: $8.75 billion

• Statistics: Computer Economics Inc., Carlsbad, California

Page 65: Malware APA Professional Center Mohammad Reza Faghani APA Professional Center Mohammad Reza Faghani

65

Some historical worms of note

Worm Date Distinction

Morris 11/88Used multiple vulnerabilities, propagate to “nearby”

sys

ADM 5/98 Random scanning of IP address space

Ramen 1/01 Exploited three vulnerabilities

Lion 3/01 Stealthy, rootkit worm

Cheese 6/01 Vigilante worm that secured vulnerable systems

Code Red 7/01First sig Windows worm; Completely memory

resident

Walk 8/01 Recompiled source code locally

Nimda 9/01 Windows worm: client-to-server, c-to-c, s-to-s, …

Scalper 6/0211 days after announcement of vulnerability; peer-to-

peer network of compromised systems

Slammer 1/03 Used a single UDP packet for explosive growth

Kienzle and Elder

Page 66: Malware APA Professional Center Mohammad Reza Faghani APA Professional Center Mohammad Reza Faghani

66

Increasing propagation speed

Code Red, July 2001 Affects Microsoft Index Server 2.0,

Windows 2000 Indexing service on Windows NT 4.0.

Windows 2000 that run IIS 4.0 and 5.0 Web servers

Exploits known buffer overflow in Idq.dll

Vulnerable population (360,000 servers) infected in 14 hours

SQL Slammer, January 2003 Affects in Microsoft SQL 2000

Exploits known buffer overflow vulnerability

Server Resolution service vulnerability reported June 2002

Patched released in July 2002 Bulletin MS02-39

Vulnerable population infected in less than 10 minutes

Page 67: Malware APA Professional Center Mohammad Reza Faghani APA Professional Center Mohammad Reza Faghani

67

Infection rate

Page 68: Malware APA Professional Center Mohammad Reza Faghani APA Professional Center Mohammad Reza Faghani

68

Striving for Greater Virulence: Nimda

Released September 18, 2001.

Multi-mode spreading: attack IIS servers via infected clients email itself to address book as a virus copy itself across open network shares modifying Web pages on infected servers w/ client

exploit scanning for Code Red II backdoors (!)

worms form an ecosystem!

Leaped across firewalls.Slides: Vern

Paxson

Page 69: Malware APA Professional Center Mohammad Reza Faghani APA Professional Center Mohammad Reza Faghani

69

How do worms propagate?

Scanning worms : Worm chooses “random” address

Coordinated scanning : Different worm instances scan different addresses

Flash worms Assemble tree of vulnerable hosts in advance, propagate along tree

Not observed in the wild, yet

Potential for 106 hosts in < 2 sec ! [Staniford]

Meta-server worm :Ask server for hosts to infect (e.g., Google for “powered by phpbb”)

Page 70: Malware APA Professional Center Mohammad Reza Faghani APA Professional Center Mohammad Reza Faghani

slammer

• 01/25/2003

• Vulnerability disclosed : 25 june 2002

• Better scanning algorithm

• UDP Single packet : 380bytes

Page 71: Malware APA Professional Center Mohammad Reza Faghani APA Professional Center Mohammad Reza Faghani

Slammer propagation

Page 72: Malware APA Professional Center Mohammad Reza Faghani APA Professional Center Mohammad Reza Faghani

Number of scan/sec

Page 73: Malware APA Professional Center Mohammad Reza Faghani APA Professional Center Mohammad Reza Faghani

Consequences

• ATM systems not available

• Phone network overloaded (no 911!)

• 5 DNS root down

• Planes delayed

Page 74: Malware APA Professional Center Mohammad Reza Faghani APA Professional Center Mohammad Reza Faghani

74

Worm Detection and Defense

Detect via honeyfarms: collections of “honeypots” Any outbound connection from honeyfarm = worm.

• (at least, that’s the theory)

Distill signature from inbound/outbound traffic.

Prevert via scan suppressors: network elements that block traffic from hosts that make failed connection attempts to too many other hosts

5 minutes to several weeks to write a signature

Several hours or more for testing

Page 75: Malware APA Professional Center Mohammad Reza Faghani APA Professional Center Mohammad Reza Faghani

75

months

days

hrs

mins

secs

ProgramViruses Macro

Viruses E-mailWorms Network

Worms

FlashWorms

Pre-automation

Post-automation

Conta

gio

n P

eri

od

Sig

natu

reR

esp

onse

Peri

od

Need for automationCurrent threats can spread faster than defenses can

reaction

Manual capture/analyze/signature/rollout model too slow

1990 Time 2005

Contagion Period

Signature Response Period

Slide: Carey Nachenberg, Symantec

Page 76: Malware APA Professional Center Mohammad Reza Faghani APA Professional Center Mohammad Reza Faghani

76

Signature inference

Challenge need to automatically learn a content “signature” for

each new worm – potentially in less than a second!

Some proposed solutions Singh et al, Automated Worm Fingerprinting, OSDI

’04

Kim et al, Autograph: Toward Automated, Distributed Worm Signature Detection, USENIX Sec ‘04

Page 77: Malware APA Professional Center Mohammad Reza Faghani APA Professional Center Mohammad Reza Faghani

77

Signature inference

Monitor network and look for strings common to traffic with worm-like behaviorSignatures can then be used for content filtering

Slide: S Savage