Files
securedorg.github.io/malware.md
2017-03-20 15:34:07 -07:00

5.8 KiB

layout, permalink, title
layout permalink title
default /RE101/section2/ Malware Techniques

Go Back to Reverse Engineering Malware 101

Section 2: Malware Techniques

Typical Attack Flow

Perimeter Recon Infiltrate Internal Recon Entrench Exfiltrate Purge
alt text alt text alt text alt text alt text alt text

Techniques Overview


Compression

Goto Top^


Obfuscation

  • Deliberate act of creating obfuscated code that is difficult for humans to understand
  • Plain text strings will appear as base64 or Xor
  • Malicious behavior will include junk functions or routines that do nothing to throw off the reverser.
    • Control-Flow Flattening
    • String Encryption

alt text

Goto Top^


Persistence

  • Once malware gains access to a system, it often looks to be there for a long time.
  • If the persistence mechanism is unique enough, it can even serve as a great way to identify a given piece of malware.

alt text

Goto Top^


Privilege Escalation

  • Exploiting a bug, design flaw or configuration oversight in an operating system or software application to gain elevated access to resources that are normally protected from an application or user.
  • Common Techniques:
    • Dll Search Order Hijacking
    • Dll injection
    • Exploiting a vulnerability
      • BufferOverflow
      • StackOverflow
      • Headspray
      • Return Orientated Programming (ROP)
    • Credential Theft
    • UAC Bypasses

Example: Dll Search Order Hijacking alt text

Goto Top^


Defense Evasion

  • Evading detection or avoiding defenses.
  • Common Techniques:
    • Killing AV
    • Deleting itself after a run
    • Timebombs/Timestomping
    • Stolen Certificates
    • Dll Side Loading
    • Masquerading
    • Process Hallowing

Goto Top^


Credential Theft

  • Going after password storage
  • Keylogging passwords
  • Screenshots

Example: Mimikatz Credential theft alt text

Example Malware

Malware Name Hash Link
mimikatz b4d7bfcfb8f85c4d2fb8cb33c1d6380e5b7501e492edf3787adee42e29e0bb25 virustotal

Goto Top^


Reconnaissance

  • Gain knowledge about the system and internal network.

Goto Top^


Lateral Movement

  • Enable an adversary to access and control remote systems on a network and could

Goto Top^


Execution

  • Techniques that result in execution of adversary-controlled code on a local or remote system
  • scripts
  • post-exploitation

Goto Top^


Collection

  • Identify and gather information, such as sensitive files, from a target network prior to exfiltration

Goto Top^


Exfiltration

  • Removing files and information

Goto Top^


Command and Control

  • Communicate with systems under their control

Goto Top^

x86 Assembly <- Back | Next -> Section 3