427 Botnet fm qxd



Download 6,98 Mb.
Pdf ko'rish
bet282/387
Sana03.12.2022
Hajmi6,98 Mb.
#878307
1   ...   278   279   280   281   282   283   284   285   ...   387
Bog'liq
Botnets - The killer web applications

www.syngress.com
Using Sandbox Tools for Botnets • Chapter 10
347
427_Botnet_10.qxd 1/9/07 3:06 PM Page 347


Finally, there is 
CWSandbox,
a result of the diploma thesis of Carsten
Willems that is being further improved and is still under development. A free
research version as well as a commercial one can be retrieved from Sunbelt
Software. More information and a live sandbox can be found at
www.cwsandbox.org and www.sunbeltsandbox.com.
In the following sections of this chapter we describe malware analysis
using the CWSandbox tool. First we introduce the general sandbox architec-
ture and its components.Then a sample analysis report for a very simple bot
application is presented and explained. After that, we give a detailed descrip-
tion of how to use the sandbox in real malware analysis as well as giving a lot
of useful and real examples of many different malicious actions that usually
are performed by a bot.That part of the chapter will give you the knowledge
and ability to 
read
an analysis report and identify the important malicious
internals of the analyzed bot software. Finally, we present some results we have
achieved on our live sandbox systems by successfully analyzing more than
10,000 malware samples.
Describing CWSandbox
CWSandbox
is an application for the automatic 
behavior analysis
of malware.
This dynamic analysis is performed by executing the malicious application in
a controlled environment and catching all its relevant calls to the Windows
API. Because these API calls are used for accessing Windows system resources
such as files, the registry, or the network, all the malware’s actions can be
examined. In a second step, a high-level summarized report is generated from
this monitored data. Since one focus lies in the analysis of bots, a big effort is
spent to extract and evaluate the network traffic data.
To give an intuitive image of the sandbox in advance, let’s look at a short
example. It shows the analysis of a bot application that was collected by a
honeypot. We will use this bot as a basic example in this chapter because it is
a simple one but comprises most of the techniques and actions that are char-
acteristic of most of the bots currently available. It is named
Backdoor.IRCBot.S
by BitDefender,
BackDoor.Generic4.VT 
by AVG, and
Backdoor.Win32.IRCBot.yc
by Kaspersky. Because of the nature of its origin,
the name chosen by us is based on its MD5 hash value; therefore, it is
82f78a89bde09a71ef99b3cedb991bcc.exe
.To start analysis in CWSandbox, the
following command is used:

Download 6,98 Mb.

Do'stlaringiz bilan baham:
1   ...   278   279   280   281   282   283   284   285   ...   387




Ma'lumotlar bazasi mualliflik huquqi bilan himoyalangan ©hozir.org 2024
ma'muriyatiga murojaat qiling

kiriting | ro'yxatdan o'tish
    Bosh sahifa
юртда тантана
Боғда битган
Бугун юртда
Эшитганлар жилманглар
Эшитмадим деманглар
битган бодомлар
Yangiariq tumani
qitish marakazi
Raqamli texnologiyalar
ilishida muhokamadan
tasdiqqa tavsiya
tavsiya etilgan
iqtisodiyot kafedrasi
steiermarkischen landesregierung
asarlaringizni yuboring
o'zingizning asarlaringizni
Iltimos faqat
faqat o'zingizning
steierm rkischen
landesregierung fachabteilung
rkischen landesregierung
hamshira loyihasi
loyihasi mavsum
faolyatining oqibatlari
asosiy adabiyotlar
fakulteti ahborot
ahborot havfsizligi
havfsizligi kafedrasi
fanidan bo’yicha
fakulteti iqtisodiyot
boshqaruv fakulteti
chiqarishda boshqaruv
ishlab chiqarishda
iqtisodiyot fakultet
multiservis tarmoqlari
fanidan asosiy
Uzbek fanidan
mavzulari potok
asosidagi multiservis
'aliyyil a'ziym
billahil 'aliyyil
illaa billahil
quvvata illaa
falah' deganida
Kompyuter savodxonligi
bo’yicha mustaqil
'alal falah'
Hayya 'alal
'alas soloh
Hayya 'alas
mavsum boyicha


yuklab olish