faster c c detection strategies for finding
play

faster c&c detection - strategies for finding algorithmically - PowerPoint PPT Presentation

. Malgorzata Debska September 22, 2015 CERT Polska faster c&c detection - strategies for finding algorithmically generated domain names Introduction - what is DGA? Malicious usage in botnets Benign DGA - false alarms in detection


  1. . Malgorzata Debska September 22, 2015 CERT Polska faster c&c detection - strategies for finding algorithmically generated domain names

  2. Introduction - what is DGA? Malicious usage in botnets Benign DGA - false alarms in detection systems Current detection techniques - classification Challenges and conclusion list of topics

  3. . introduction - what is dga?

  4. 4 algorithmically generated domain names

  5. • randomness of characters • characters set • distribution of frequency of character usage • length of generated domains • level of domain generation • utilized set of top level domains 5 diffrencies in generated domains:

  6. • randomness of characters • characters set • distribution of frequency of character usage • length of generated domains • level of domain generation • utilized set of top level domains 5 diffrencies in generated domains:

  7. • randomness of characters • characters set • distribution of frequency of character usage • length of generated domains • level of domain generation • utilized set of top level domains 5 diffrencies in generated domains:

  8. • randomness of characters • characters set • distribution of frequency of character usage • length of generated domains • level of domain generation • utilized set of top level domains 5 diffrencies in generated domains:

  9. • randomness of characters • characters set • distribution of frequency of character usage • length of generated domains • level of domain generation • utilized set of top level domains 5 diffrencies in generated domains:

  10. • randomness of characters • characters set • distribution of frequency of character usage • length of generated domains • level of domain generation • utilized set of top level domains 5 diffrencies in generated domains:

  11. dyre gameover-zeus banjori a3f6e2d182a40304a8874e994a294ec314.cc bnmtsemitismgavenuteq.com antisemitismgavenuteq.com hlrfrsensinaix.com xjsrrsensinaix.com 5bpzt0njqbkqlbwupc8vi3yt.org 1fhvdfa1hr7na1gu9vmv6r710j.biz 1yz3uuo1yg5zmf1u7goe81sy0xy9.net 1g22l018lpt4alpeypioqq24k.com cc466dc54278d8e0fe14bdd2038b927e6f.to b5191b0ad53da1f1fa66653610e7601856.ws 6 galin.eu puzej.eu qekol.eu lykef.eu safkylboxhb.com ctskthnhq.com mhrmhuxlcvkxay.com pttthldqrdt.net qeh2p2u9pd3i1.com fg4zstnd3ftwh.net jmqvlmmbred2e.com examples tinba-dga dircrypt simda

  12. 6 qekol.eu 1yz3uuo1yg5zmf1u7goe81sy0xy9.net 1g22l018lpt4alpeypioqq24k.com xjsrrsensinaix.com cc466dc54278d8e0fe14bdd2038b927e6f.to b5191b0ad53da1f1fa66653610e7601856.ws a3f6e2d182a40304a8874e994a294ec314.cc hlrfrsensinaix.com galin.eu puzej.eu lykef.eu 5bpzt0njqbkqlbwupc8vi3yt.org antisemitismgavenuteq.com safkylboxhb.com ctskthnhq.com mhrmhuxlcvkxay.com bnmtsemitismgavenuteq.com pttthldqrdt.net qeh2p2u9pd3i1.com fg4zstnd3ftwh.net jmqvlmmbred2e.com 1fhvdfa1hr7na1gu9vmv6r710j.biz examples tinba-dga dyre gameover-zeus dircrypt simda banjori

  13. . malicious usage in botnets

  14. Every second infected host try to connect with hundreds or thousands alghoritmically generated domain name • most of domains return NX response • attacker needs to have a couple of registered domains 8 c&c server’s name example

  15. Every second infected host try to connect with hundreds or thousands alghoritmically generated domain name • most of domains return NX response • attacker needs to have a couple of registered domains 8 c&c server’s name example

  16. • DNS communication • algorithm that generates domain names • shared seed between botmaster and clients • victims search C&C server by DNS query 9 dga botnet communication

  17. • DNS communication • algorithm that generates domain names • shared seed between botmaster and clients • victims search C&C server by DNS query 9 dga botnet communication

  18. • DNS communication • algorithm that generates domain names • shared seed between botmaster and clients • victims search C&C server by DNS query 9 dga botnet communication

  19. • DNS communication • algorithm that generates domain names • shared seed between botmaster and clients • victims search C&C server by DNS query 9 dga botnet communication

  20. 10 generator’s seed Is it easy to predict and sinkhole DGA domains ahead?

  21. Figure 1: Ramnit All domains generated alghoritmically are dependent on specified seed • date (CryptoLocker, Conficker, GameOverZeus) • currently trending Twitter hashtag (Torpig) • seed hardcoded in infected file (Tinba) • ... Seeds are globally consistent - victims use the same one at the same time 11 generator’s seed

  22. Figure 1: Ramnit All domains generated alghoritmically are dependent on specified seed • date (CryptoLocker, Conficker, GameOverZeus) • currently trending Twitter hashtag (Torpig) • seed hardcoded in infected file (Tinba) • ... Seeds are globally consistent - victims use the same one at the same time 11 generator’s seed

  23. Figure 1: Ramnit All domains generated alghoritmically are dependent on specified seed • date (CryptoLocker, Conficker, GameOverZeus) • currently trending Twitter hashtag (Torpig) • seed hardcoded in infected file (Tinba) • ... Seeds are globally consistent - victims use the same one at the same time 11 generator’s seed

  24. Figure 1: Ramnit All domains generated alghoritmically are dependent on specified seed • date (CryptoLocker, Conficker, GameOverZeus) • currently trending Twitter hashtag (Torpig) • seed hardcoded in infected file (Tinba) • ... Seeds are globally consistent - victims use the same one at the same time 11 generator’s seed

  25. Figure 1: Ramnit All domains generated alghoritmically are dependent on specified seed • date (CryptoLocker, Conficker, GameOverZeus) • currently trending Twitter hashtag (Torpig) • seed hardcoded in infected file (Tinba) • ... Seeds are globally consistent - victims use the same one at the same time 11 generator’s seed

  26. Figure 1: Ramnit All domains generated alghoritmically are dependent on specified seed • date (CryptoLocker, Conficker, GameOverZeus) • currently trending Twitter hashtag (Torpig) • seed hardcoded in infected file (Tinba) • ... Seeds are globally consistent - victims use the same one at the same time 11 generator’s seed

  27. All domains generated alghoritmically are dependent on specified seed • date (CryptoLocker, Conficker, GameOverZeus) • currently trending Twitter hashtag (Torpig) • seed hardcoded in infected file (Tinba) • ... Seeds are globally consistent - victims use the same one at the same time 11 generator’s seed Figure 1: Ramnit

  28. All domains generated alghoritmically are dependent on specified seed • date (CryptoLocker, Conficker, GameOverZeus) • currently trending Twitter hashtag (Torpig) • seed hardcoded in infected file (Tinba) • ... Seeds are globally consistent - victims use the same one at the same time 11 generator’s seed Figure 1: Ramnit

  29. 12 • Cryptolocker AND MORE ... • Ramdo • Necrus • Flashback • Gozi • DirCrypt • Qakbot • BankPatch • Gozi • Emotet • Rovnix • Pykspa • Dyre • Shiotob • Necurs • Murofet • Bobax • Conficker • Ramnit • Pykpsa • Emotet • Pushdo • Matsu • Banjori • GameoverZeus is it a serious problem? what malware use dga?

  30. • domain name contains random alphanumeric characters and words from dictionary • names are builds from english syllables 13 different techinques but still dga

  31. • domain name contains random alphanumeric characters and words from dictionary • names are builds from english syllables 13 different techinques but still dga

  32. . benign dga - false alarms in detection systems

  33. 0.0.0.0.1.0.0.4e.135jg5e1pd7s4735ftrqweufm5.avqs.mcafee.com 0.0.0.0.1.0.0.4e.13cfus2drmdq3j8cafidezr8l6.avqs.mcafee.com 0.0.0.0.1.0.0.4e.13kqas3qjj46ttkdhastkrdsv6.avqs.mcafee.com 0.0.0.0.1.0.0.4e.13pq3hfpunqn1d51pmvbdkk5s6.avqs.mcafee.com 0.0.0.0.1.0.0.4e.13qh71bf782qb54uzz9uhdz4mq.avqs.mcafee.com This higher level domain contains basic information about the file, its hash, version of the McAfee system and information about the execution environment 1 DNS Noise: Measuring the Pervasiveness of Disposable Domains in Modern DNS Traffic, Yizheng Chen et al. 15 requests of av tools Example 1

  34. 0.0.0.0.1.0.0.4e.135jg5e1pd7s4735ftrqweufm5.avqs.mcafee.com 0.0.0.0.1.0.0.4e.13cfus2drmdq3j8cafidezr8l6.avqs.mcafee.com 0.0.0.0.1.0.0.4e.13kqas3qjj46ttkdhastkrdsv6.avqs.mcafee.com 0.0.0.0.1.0.0.4e.13pq3hfpunqn1d51pmvbdkk5s6.avqs.mcafee.com 0.0.0.0.1.0.0.4e.13qh71bf782qb54uzz9uhdz4mq.avqs.mcafee.com This higher level domain contains basic information about the file, its hash, version of the McAfee system and information about the execution environment 1 DNS Noise: Measuring the Pervasiveness of Disposable Domains in Modern DNS Traffic, Yizheng Chen et al. 15 requests of av tools Example 1

  35. • Now, IDNs are also used for malicious purposes • IDNs always begin with ’xn–’ prefix 16 internationalized domain name

  36. • Now, IDNs are also used for malicious purposes • IDNs always begin with ’xn–’ prefix 16 internationalized domain name

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend