00:03
>> If you were to look at some more malware,
00:03
there's plenty of websites where you can get it.
00:03
There's many websites like Contagio Malware Dump,
00:03
the blog where they will provide analysis.
00:03
They will say, "Hey, I saw this virus do this,
00:03
and it does this interesting thing."
00:03
You can download the malware and try to
00:03
find that stuff by yourself.
00:03
I like buyer's share.
00:03
like getting your stuff from other people,
00:03
you can always catch your own, make the honeypot.
00:03
There is plenty of software
00:03
out there that we'll cover later.
00:03
We can just next deploy,
00:03
and it'll just catch malware,
00:03
and you can analyze it.
00:03
Of course, you can always make your own malware.
00:03
There is plenty of builders out
00:03
there and there's source code out there.
00:03
A few notes for the paranoid people among you.
00:03
I will include the slide at the end of every lecture.
00:03
Some malware can execute
00:03
upon being scanned by antivirus products.
00:03
I've seen vulnerabilities and antivirus scanners.
00:03
They are not infallible.
00:03
I've seen malware that will
00:03
execute as soon as the icon is viewed,
00:03
like a Word icon or a PDF icon,
00:03
or even a system icon.
00:03
In fact, that's how as one to two others
00:03
was that as soon as a file system
00:03
recognized the icon there,
00:03
it would automatically execute code,
00:03
which is pretty dangerous,
00:03
especially for a malware analyst
00:03
where we're just looking at that icon.
00:03
Now we didn't have an extension on it,
00:03
but we are still looking at it.
00:03
I've even seen where
00:03
extracting the file from the archive,
00:03
like we did, can execute the code.
00:03
That was a nasty zero day,
00:03
but know this stuff is out there,
00:03
not very common, but it
00:03
is out there, and you should be careful,
00:03
and we will learn how to deal with
00:03
malware in a more safe manner in the next video.
00:03
Then another note for those people who are paranoid,
00:03
MD5 is the industry standard right now,
00:03
but it can be manipulated.
00:03
Then there are MD5 hashes
00:03
out there for benign files like NIST,
00:03
the National Institute for Standards and Technology,
00:03
They keep a database of benign hashes,
00:03
of known good software hashes.
00:03
We're soon going to be looking at
00:03
the MD5s of those hashes.
00:03
They can make their malware
00:03
produce that hash where it is not
00:03
the exact replica of those bits.
00:03
their own creation and that's what we call a
00:03
hash collision and that's bad.
00:03
We should never have that,
00:03
but it is more common with MD5,
00:03
I don't think anyone has ever
00:03
successfully done it for SHA256.
00:03
The industry is moving towards
00:03
the SHA256 based identification,
00:03
but it's not there yet.
00:03
For those people who are paranoid about viewing icons,
00:03
we can work exclusively in
00:03
a command line only environment.
00:03
Just to show you that,
00:03
I'll show you here that we have sigma open,
00:03
and so everything we did,
00:03
we can do from a command line.
00:03
Sig drive, we can go to C drive,
00:03
to just autocomplete I just hit tab.
00:03
Now I'm in the desktop,
00:03
the first thing we did was we
00:03
looked at it in a hex editor,
00:03
then the filename, and then I will pipe it to less.
00:03
I can do just the top of the file.
00:03
There is the MZ header.
00:03
There's the DAS moves string,
00:03
there is the PE header.
00:03
You'll learn about that in the future,
00:03
but we now know what's an executable on EXE or DL file,
00:03
and we can even run a string on the bar up to left,
00:03
if you save strings,
00:03
go down to the bottom, you see some function names.
00:03
We know that it can create a file,
00:03
we know that is looking for
00:03
>> another module by file name,
00:03
>> we know it's important KERNEL32.dl,
00:03
which is pretty common.
00:03
We know those pops of job. We're done.
00:03
Bottom, we see the same strings we've seen before.
00:03
Padding, some strings,
00:03
Q to exit from less.
00:03
We also got the MD5 sum of the malware,
00:03
so we can go ahead and do that.
00:03
so here's the MD5 hash that we had before,
00:03
where we can search bars total form.
00:03
This is all without looking at the icon.
00:03
If we just want to verify that it wasn't executable,
00:03
we can use the file command.
00:03
It will pull up, that is a PE executable for Windows,
00:03
using the GUI subsystem,
00:03
the graphics subsystem, like an exit.
00:03
Just to recap of what we've learned today,
00:03
the vernacular and terminology was for malware.
00:03
We learned about different malware types
00:03
and functionality and how they can easily overlap,
00:03
and when the overlap happens,
00:03
it's called the blended threat.
00:03
We did a one-minute triage with freely available tools.
00:03
I also showed how to do that from the command line.
00:03
I showed you where to get samples if you need them.
00:03
I'll also suggest at the end of every lecture,
00:03
get resources if you want to get more into this topic.
00:03
but I highly suggest Practical Malware Analysis.
00:03
It's a big thick book,
00:03
but it is very good.
00:03
They have malware that they'll give you,
00:03
based on whatever you learned in that chapter,
00:03
and at the back of the book,
00:03
they will show you their analysis which you should
00:03
have seen and what you
00:03
should make conclusion should have come to.
00:03
That has been extremely effective learning tool
00:03
for me and many other people.
00:03
Virus Research and Defense is
00:03
a classic book that's been around for a while.
00:03
It's a little dry to restrict through.
00:03
It's also big and thick.
00:03
But it's really more meant to be a reference.
00:03
But I know most people in my career field
00:03
and in your career field as well.
00:03
Pretty much all of them have Practical Malware
00:03
Analysis right there on their desk.
00:03
Thank you for watching the introduction
00:03
to the malware analysis on Cybrary.
00:03
We hope you've learned a lot and will continue
00:03
to watch our videos here. Have a nice day.