Homeland Security
National Cybersecurity and Communications Integration Center
Command and Control Mechanism Trends in Exploit Kits, RATs, APTs, and Other Malware
January 13, 2016
Mark Mager US-CERT Code Analysis Team
Command and Control Mechanism Trends in Exploit Kits, RATs, APTs, - - PowerPoint PPT Presentation
Command and Control Mechanism Trends in Exploit Kits, RATs, APTs, and Other Malware January 13, 2016 Mark Mager US-CERT Code Analysis Team Homeland National Cybersecurity and Communications Integration Center Security Agenda About Me
Homeland Security
National Cybersecurity and Communications Integration Center
Mark Mager US-CERT Code Analysis Team
Homeland Security
Office of Cybersecurity and Communications
Homeland Security
Office of Cybersecurity and Communications
3
Homeland Security
Office of Cybersecurity and Communications
4
Homeland Security
Office of Cybersecurity and Communications
– Keylogging, process enumeration, reverse shell
5
Homeland Security
Office of Cybersecurity and Communications
6
Homeland Security
Office of Cybersecurity and Communications
7
Homeland Security
Office of Cybersecurity and Communications
8
Homeland Security
Office of Cybersecurity and Communications
9
Homeland Security
Office of Cybersecurity and Communications
10
Homeland Security
Office of Cybersecurity and Communications
– *.*/wp-content/uploads/*
11
Homeland Security
Office of Cybersecurity and Communications
– 48 54 54 50 5c 31 2e 31 20 53 79 63 6d 65 6e 74 65 63 d3
12
Homeland Security
Office of Cybersecurity and Communications
– Accept: */* – OldServer: 0 – Check: 0 – PostSize: 61456 – PostSerial: 1 – User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; .NET CLR 2.0.50727; .NET CLR 3.0.04506.648; .NET CLR 3.5.21022; InfoPath.2; SV1) – Host: xxx.xxx.xxx.xxx – Content-Length: 0 – Cache-Control: no-cache
13
Homeland Security
Office of Cybersecurity and Communications
14
Homeland Security
Office of Cybersecurity and Communications
– x86 instructions (e.g. pushf, popf) not often seen in compiled code – meaningless instructions (e.g. or ax, ax)
– e.g. code blocks begin with several push instructions in a row and pushf and then end with the equivalent popf / pop instructions
15
Homeland Security
Office of Cybersecurity and Communications
16
Homeland Security
Office of Cybersecurity and Communications
– Unprintable Unicode characters – Obscured control flow » Nested, indirect function calls – Functionality spread across several classes
17
Homeland Security
Office of Cybersecurity and Communications
18
Homeland Security
Office of Cybersecurity and Communications
19
54 1 5 2 1 2 3 13 51 Executables PDFs Word Docs SWFs JARs Silverlight E-mails Web Other
Homeland Security
Office of Cybersecurity and Communications
20
47 7 32-bit 64-bit
Homeland Security
Office of Cybersecurity and Communications
21
Homeland Security
Office of Cybersecurity and Communications
22