427 Botnet fm qxd



Download 6,98 Mb.
Pdf ko'rish
bet301/387
Sana03.12.2022
Hajmi6,98 Mb.
#878307
1   ...   297   298   299   300   301   302   303   304   ...   387
Bog'liq
Botnets - The killer web applications

www.syngress.com
368
Chapter 10 • Using Sandbox Tools for Botnets
427_Botnet_10.qxd 1/9/07 3:06 PM Page 368


Evidence for all these pieces of information can be obtained from an anal-
ysis report that is created by CWSandbox. In the following sections, those
items are examined in detail, and extracting evidence for them from an anal-
ysis report is explained.
How Does the Bot Install?
If we want to check whether a given host already is infected with a particular
malware or if we want to clean a host from that parasite, we need information
about the locations where the malware installs its files and about the mecha-
nisms it uses to automatically execute at system startup. Finding the answer to
the latter question normally also solves the first one, since any autostart mech-
anism needs the information where to find the process to start. Windows
offers many different possibilities to instruct the system to execute a specific
application automatically on startup.The great tool 
AutoRuns
2.
shows most of
them.Though there are many ways, nearly all malware either uses one of the
\run
sections of the registry or installs a Windows Service application or
kernel driver. However, the malware needs to modify a registry setting to set
up any form of autostart mechanism. CWSandbox reports all accesses to the
registry, so you easily can filter out those accesses. As we already saw, registry
accesses are contained in the 

and the relevant entries are
 
and
.
Here are some examples of malware that
installs as an autostart process, using different registry sections:

subkey_or_value="mirosoftware" data="C:\WINDOWS\MEDIA\microsoftware.exe"/>
subkey_or_value="MS Domain Name Server Deamon" data="MSDNSD32.exe"/>
subkey_or_value="AppInit_DLLs" data="bampklkf.dll"/>
Notify\directut" subkey_or_value="DllName" data="directut.dll"/>
As mentioned, some bots do not install as normal programs but as
Windows Service applications. In that case, beside the changes to the registry,
the analysis report will contain lines like these:




Download 6,98 Mb.

Do'stlaringiz bilan baham:
1   ...   297   298   299   300   301   302   303   304   ...   387




Ma'lumotlar bazasi mualliflik huquqi bilan himoyalangan ©hozir.org 2024
ma'muriyatiga murojaat qiling

kiriting | ro'yxatdan o'tish
    Bosh sahifa
юртда тантана
Боғда битган
Бугун юртда
Эшитганлар жилманглар
Эшитмадим деманглар
битган бодомлар
Yangiariq tumani
qitish marakazi
Raqamli texnologiyalar
ilishida muhokamadan
tasdiqqa tavsiya
tavsiya etilgan
iqtisodiyot kafedrasi
steiermarkischen landesregierung
asarlaringizni yuboring
o'zingizning asarlaringizni
Iltimos faqat
faqat o'zingizning
steierm rkischen
landesregierung fachabteilung
rkischen landesregierung
hamshira loyihasi
loyihasi mavsum
faolyatining oqibatlari
asosiy adabiyotlar
fakulteti ahborot
ahborot havfsizligi
havfsizligi kafedrasi
fanidan bo’yicha
fakulteti iqtisodiyot
boshqaruv fakulteti
chiqarishda boshqaruv
ishlab chiqarishda
iqtisodiyot fakultet
multiservis tarmoqlari
fanidan asosiy
Uzbek fanidan
mavzulari potok
asosidagi multiservis
'aliyyil a'ziym
billahil 'aliyyil
illaa billahil
quvvata illaa
falah' deganida
Kompyuter savodxonligi
bo’yicha mustaqil
'alal falah'
Hayya 'alal
'alas soloh
Hayya 'alas
mavsum boyicha


yuklab olish