00:04
>> Like I said before, we're
00:04
going to go through a few basic tools
00:04
and just a very basic one-minute three-hour situation.
00:04
I'm just going to say, SysInternals by
00:04
Mark Russinovich is really good.
00:04
The Map Pack, the malware analysis pack
00:04
by David Zimmer is really good.
00:04
I would highly suggest you get
00:04
a text editor like 010 is really good.
00:04
There are free ones out there.
00:04
a lot of these are free.
00:04
I would suggest one of those,
00:04
but we're not going to show them here.
00:04
A disassembler, IDA Pro is the industry standard,
00:04
but there are some others there that are pretty decent.
00:04
Hoppers from ACT, x64_debug does a pretty good job at
00:04
debugging or does a pretty good job
00:04
at disassembling 64-bit code.
00:04
But it is the debugger,
00:04
so it will start automatically
00:04
executing code if you're not careful.
00:04
Just as a personal preference,
00:04
I would prefer Cygwin,
00:04
this is a Linux environment
00:04
because it has with it MD5sums,
00:04
you can calculate hashes.
00:04
GCC is a GNU C compiler that can be used to
00:04
create executable code that from C code,
00:04
from the command line right there quite easily.
00:04
If you don't want to install Visual Studio,
00:04
xxd is a hex viewer,
00:04
But command line-based,
00:04
the file command, the strings command,
00:04
and Cygwin also have this on Python
00:04
2.7 and 3.3 distributions inside of it.
00:04
Nifty, if you just want to have an all in
00:04
one package for a bunch of different tools.
00:04
Notepad++ is a text editor I highly suggest and 7zip is
00:04
a compression and decompression tool
00:04
that I highly suggest.
00:04
I'm going to say you were presented with a sample,
00:04
Let's say these are the tools I just adjusted.
00:04
>> Malware analysis pack,
00:04
>> you just run and it'll install several
00:04
of these shell extensions, not that.
00:04
It will also install some of these shell extensions
00:04
such as MD5 hash and string submit virus total,
00:04
010 and then install this shell extension.
00:04
7zip here, install this shell extension,
00:04
which is really nifty because you can
00:04
easily just extract lots of different file types.
00:04
This is an MSI file type,
00:04
so I can probably extract that.
00:04
If I look over here on my desktop,
00:04
I'll find that it was extracted.
00:04
Then if I open that,
00:04
I can see that there's lots
00:04
of files in that MSI installer.
00:04
Then I can further dive into
00:04
this EXE file and say I would like to
00:04
extract that and cue it
00:04
inside the EXE file with all the different sections,
00:04
the dot text section is famous for having
00:04
executable code and not actual text
00:04
for some weird reason.
00:04
Inside the resource section,
00:04
I can find a text file.
00:04
Sometimes malware keeps
00:04
other malware or other components,
00:04
other executables in their resource sections.
00:04
Here's pretty benign, it's just a text file.
00:04
But when you're setting up Cygwin,
00:04
it's important to note that some tools aren't
00:04
installed by default and
00:04
here I'm just going to run through the basic.
00:04
If you're installing this software the
00:04
first time and this scares you,
00:04
don't let it scare you,
00:04
all the packages should be signed and verified,
00:04
so I usually pick just any old thing.
00:04
You'd like to stick to edu or government websites.
00:04
To get one command that I really like called Bile,
00:04
I will have to type in binutils.
00:04
You go to development and it's
00:04
this first one here, binutils.
00:04
I've already installed it,
00:04
but you should click this to make sure it installs.
00:04
Another one is xxd under editors.
00:04
I'm pretty sure it is default.
00:04
No, the last one is gcc.
00:04
You don't have to install it if you don't want to.
00:04
I prefer to keep it around,
00:04
give it just, like I said,
00:04
if you to pump some C code up.
00:04
Let's say you get a sample here,
00:04
you don't know what it is.
00:04
Some instant response guy said he just found it,
00:04
in a hex editor just to see what's there.
00:04
On the left-hand side, here's
00:04
the raw binary data represented in hexadecimal format.
00:04
I'm going to write on the left-hand side,
00:04
it shows the raw hexadecimal format
00:04
and on the right-hand side,
00:04
it shows the ASCII representation of the binary data.
00:04
Obviously, the binary data is a lot of
00:04
gibberish if you tried to view it as English text.
00:04
But a lot of programmers have a lot of
00:04
embedded ASCII like Mz.
00:04
you know this is an executable or
00:04
Windows executable due to this file header.
00:04
This string is more proof that it has
00:04
a DOS file header and this is what we call PE header,
00:04
we are going to learn a lot more about PE files in
00:04
the future but not right now,
00:04
you just know that this is
00:04
an EXE file or a DLL file at this point.
00:04
Let's say I want to get hash,
00:04
it has an icon right here.
00:04
I can copy the hash and search Google for it.
00:04
it's for a virus total.
00:04
For those of you who don't know virus total,
00:04
it's a website where you can submit any file
00:04
and it will scan it with about 52,
00:04
it goes up and down sometimes,
00:04
with 52 at this point in time,
00:04
antivirus products and it
00:04
will tell you the detection's between them.
00:04
This should not be used as
00:04
>> an end-all be-all in security.
00:04
>> But it is useful.
00:04
We see the first analysis in 2014,
00:04
in May it was uploaded by this name.
00:04
This is a SHA256 hash.
00:04
You've all this information saying, "Okay.
00:04
There's one person who commented,
00:04
I had 42 detections."
00:04
A lot of them say Symmi, Zbot,
00:04
Zbot, and Zbot, and Zbot.
00:04
that might lead to some more information;
00:04
Zeus malware, Trojan.zbot, trojan.zbot.
00:04
It's good stuff in the comments.
00:04
Someone has commented, malware family
00:04
Zeus, version 2.1.0.1.
00:04
Some other information, which is pretty cool.
00:04
confirmed this is Zbot, this malware example.
00:04
It's important to know
00:04
that why I have shown you a few tools,
00:04
your analysis should drive the tools.
00:04
Your tools should not drive your analysis.
00:04
Now, let that sink in for a moment.
00:04
Your tools should not drive the analysis.
00:04
You should not say, "Oh,
00:04
I have this or this tool,
00:04
let me run this script or
00:04
let me upload to virustotal every single time.
00:04
Because I've seen some stuff on
00:04
virustotal that probably shouldn't have been
00:04
uploaded like sensitive company emails
00:04
or internal memos or classified things,
00:04
things that should not be up there,
00:04
but people are just like, "Oh,
00:04
let me just upload everything because virustotal told
00:04
me that the virus is not very good."
00:04
there's any strings in the malware,
00:04
with the malware analysis pack tool.
00:04
I can see that there's a lot of gibberish.
00:04
This stuff looks interesting.
00:04
In a way, I can Google for this type of
00:04
stuff to do like an RP page.
00:04
This looks like a PDF document type of stuff,
00:04
so maybe this thing drops
00:04
a PDF after it's done executing,
00:04
it will display a PDF file
00:04
so that it doesn't look as suspicious.