The Detection of 8 Type Malware botnet using Hybrid ...

28 downloads 144 Views 1MB Size Report
Analysis in Executable File Windows Operating Systems ... Windows OS : executable file (.exe) ← malware / botnet ... activities, and network traffic monitoring.
The Detection of 8 Type Malware botnet using Hybrid Malware Analysis in Executable File Windows Operating Systems G.B. Satrya, N.D.W. Cahyani, and R.F. Andreta Forensics and Security Laboratory, Telkom School of Computing, Telkom University, Bandung. Indonesia.

Outline i.

Introduction

ii.

Related Works

iii.

Malware Analysis Overview

iv.

Proposed Scheme

v.

Implementation & Analysis

vi.

Conclusion

Introduction ▪ Internet  Cybercrime ▪ Cybercrime  botnet ▪ Windows OS : executable file (.exe)  malware / botnet

▪ Botnet Detection  Malware Analysis

Related Works Based on a Feily’s study, creation of a botnet consists of 5 stages: i.

Initial infection

ii. Secondary injection

iii. Connection iv. Malicious command and control v. Updates and maintenance.

Botnet Overview

J. Park. Acquiring Digital Evidence from Botnet Attacks: Procedures and Methods. PhD thesis, AUT University, 2011.

Malware Analysis Overview ▪ Malware backdoor, botnet, downloader, launcher, rootkit, scareware, spam, virus/worm

▪ Malware Analysis 

Static Malware Analysis

File fingerprinting by hashing, Extraction of hard coded strings, Disassembly, Extract linked libraries and functions, and Debugging 

Dynamic Malware Analysis

Viewing Process Details, File System monitoring activities, Registry activities, and network traffic monitoring

monitoring

[14] M. Sikorski and A. Honig. Practical Malware Analysis: The HandsOn Guide to Dissecting Malicious Software. No Starch Press, 1 edition, March 2012. [15] C. Valli. The malware analysis body of knowledge (mabok). 2008.

Network Topology (in Laboratory)

Flowchart of Hybrid Analysis

Botnet Samples No

Botnet Name

1 2 3 4 5 6 7 8

Herpestnet Ann Loader mbot Vertexnet Athena Elite Loader Gbot Cythosia

Download & Execute √ √ √ √ √ √ √ √

Visit Website √ X √ √ X X X X

Key logger x x x √ x x x x

Flood Attack x x x √ √ x √ √

Update

Uninstall

√ x x √ √ √ √ √

√ x x √ √ x x √

Data Characteristics of Botnet No 1 2 3 4 5 6 7 8 9

Criteria Url contained in the embedded strings There is a Botnet Command on embedded strings There is Autorun registry on embedded strings Has a Verified signature Command line when there is executed Doing File duplication in the system Make additions to the system Registry Autorun On network traffic visible to communicate with a web via url Gateway (HTTP) Receive Command from a server, and then perform the functionality

Information Risk Level Yes 3 Yes 4 Yes 2 No 3 No 1 Yes 5 Yes 5 Yes 3 Yes

5

Risk Level [botnet VS non-botnet]

Conclusion  by using the data recommendation (risk level) from the results of hybrid malware analysis, can be generated characteristics data of botnet  by looking at the malware botnet linked libraries, it can detect functionalities contained



testing to detect other types of malware in addition to botnets



Using a 64-bit Windows operating system as an infected system

Thank You The Detection of 8 Type Malware botnet using Hybrid Malware Analysis in Executable File Windows Operating Systems

G.B. Satrya, N.D.W. Cahyani, and R.F. Andreta Forensics and Security Laboratory, Telkom School of Computing, Telkom University, Bandung. Indonesia.

Suggest Documents