jmp Ring_ZerO

; go to ring zero
نوشته شخصی و فنی

jmp Ring_ZerO

نوشته شخصی و فنی

۳ مطلب در تیر ۱۳۹۲ ثبت شده است

  • ۱
  • ۰

Shellcode Analysis

سلام.

ابزارهای مختلفی برای آنالیز شلکدها هست، امروز دوتا ابزار رو معرفی میکنم که یکی به زبان پایتون ShellDetect که محض آشنایی و نحوه کدنویسی در پایتون هستش :دی

ابزار اصلی scdbg هست که برپایه libemu برای آنالیز شلکدها ساخته شده است. با این ابزار شلکدها رو emulate کرده و تمامی API های که شلکد میخاد فراخوانی کنه رو نشون میده.

در زیر یک تصویر نمونه رو میبینین :

JMP.Ring0

  • ۰
  • ۰

As organizations become ever more dependent on networked operations, they are increasingly vulnerable to attack by a variety of attackers, including criminals terrorists and nation states using cyber attacks. New malware attacks, including viruses, Trojans, and
worms, are constantly and rapidly emerging threats However, attackers often reuse code and techniques from previous attacks. Both by recognizing the reused elements from previous attacks and by detecting patterns in the types of modification and reuse observed, we can more rapidly develop defenses, make hypotheses about the source of the malware, and predict and prepare to defend against future attacks We achieve these objectives in Malware Analysis and Attribution using Genetic Information (MAAGI) by
adapting and extending concepts from biology and linguistics. First, analyzing the “genetics” of malware (i.e., reverse engineered representations of the origina program) provides critical information about the program that is not available by looking only at the executable program. Second, the evolutionary process of malware (i.e., the transformation from one species of malware to another) can provide insights into the ancestry of malware, characteristics of the attacker and where future attacks might come from and wha they might look like. Third, functional linguistics is the study of the intent behind communicative acts; its application to malware characterization can suppor the study of the intent behind malware behaviors. To this point in the program, we developed a system tha uses a range of reverse engineering techniques including static, dynamic, behavioral, and functiona analysis that clusters malware into families. We are also able to determine the malware lineage in some situations. Using behavioral and functional analysis we are also able to identify a number of functions and purposes of malware.

Download

  • ۰
  • ۰

Detection based on features is most popular way to  prevent malware these days. Current feature abstracting and matching methods are susceptible to obfuscation techniques,  and cannot deal with the variants which are emerging quickly.


This paper proposes a malware feature extracting method based on its behaviors. This method can abstract the critical behaviors of malware and the dependencies between them through dynamic analysis, and generate the features to defeat malware obfuscations considering semantic irrelevancy and semantic equivalency to improve the describing capabilities of the malware features. This paper also designs a corresponding detecting method based on these features. The experiment results show that our method is more resilient to malware obfuscation techniques, especially for real world malware
variants.

Download