Malware Analysis Research: Threat Intelligence & Malware Infrastructures Andrea Lanzi: andrea.lanzi@unimi.it May, 3 2017 Andrea Lanzi: andrea.lanzi@unimi.it
Malware Analysis Malware Analysis Malicious Infrastruture Who am I? My research focuses on systems and systems security: Memory Error Detection and exploitation. Malware Detection and Analysis (program analysis techniques). Software Reverse Engineering (program analysis techniques). Hardware-supported Virtualization (OS protection). Studying the Malicious Infrastructures (ToR, SPAM, Sandboxes etc.). Andrea Lanzi: andrea.lanzi@unimi.it
Malware Analysis Malware Analysis Malicious Infrastruture Malicious Infrastructure Study the malicious phenomena on the network and try to understand the business model under the malicious infrastructures. Try to design defensive system that are able to shutdown or detect such malicious infrastructures. Challenges here is to find out automatic techniques (e.g., program analysis, network algorithms etc.) that can be applied in order to design analysis framework for new business model. Andrea Lanzi: andrea.lanzi@unimi.it
Malware Analysis Malware Analysis Malicious Infrastruture Spam is an ever-green economy despite the several botnet takedowns. Spam ranges: Search Engine Optimization product advertising generic phishing targeted malware spreading Andrea Lanzi: andrea.lanzi@unimi.it
Malware Analysis Malware Analysis Malicious Infrastruture Rather than focusing on spam prevention, we want to analyze the infrastructure that is the basis of modern spam business. URLs embedded advertised in spam messages can be distinguished in two groups: source: intial URLs advertised by the spammer final: pages where the user ends up when he visits a source URL 1 Many source URL may redirect to a single final URL 2 One redirection chain leads from a source URL to a final URL Andrea Lanzi: andrea.lanzi@unimi.it
Malware Analysis Malware Analysis Malicious Infrastruture Structure and content information: continuous recrawl of the suspicious chains information collected from different sources focus on identifying the most important nodes ( TDSes ) Contributions: analysis of the evolution of the malicious infrastructure development of an approach for identifying malicious nodes/domains Andrea Lanzi: andrea.lanzi@unimi.it
Malware Analysis Malware Analysis Malicious Infrastruture Example of chains: H3 1 H1 2 H1 → H2 → H3 3 H4 → H2 → H3 4 Possible approaches: in-degree analysis Pagerank clustering using features of the page Andrea Lanzi: andrea.lanzi@unimi.it
Malware Analysis Malware Analysis Malicious Infrastruture Example of chains: H3 1 H1 2 H1 → H2 → H3 3 H4 → H2 → H3 4 Possible approaches: in-degree analysis Pagerank clustering using features of the page Andrea Lanzi: andrea.lanzi@unimi.it
Malware Analysis Malware Analysis Malicious Infrastruture Example of chains: H3 1 H1 2 H1 → H2 → H3 3 H4 → H2 → H3 4 Possible approaches: in-degree analysis Pagerank clustering using features of the page Andrea Lanzi: andrea.lanzi@unimi.it
Malware Analysis Malware Analysis Malicious Infrastruture Study Pilot I 10,000 malicious chains chains re-crawled consecutively for 11 days detection rule : TDS if linked by two distinct domains Andrea Lanzi: andrea.lanzi@unimi.it
Malware Analysis Malware Analysis Malicious Infrastruture Study Pilot II using only most frequent other 10,000 malicious chains version of a chain chains re-crawled detection rule : TDS if linked consecutively for 60 days by two distinct domains Correctly identi- fied 7988 mali- cious chains out of the 10,000 considered. Andrea Lanzi: andrea.lanzi@unimi.it
Malware Analysis Malware Analysis Malicious Infrastruture Andrea Lanzi: andrea.lanzi@unimi.it
Malware Analysis Malware Analysis Malicious Infrastruture Needles in a Haystack: Mining Information from Public Dynamic Analysis Sandboxes for Malware Intelligence Published in USENIX Security Symposium 2015 Novel methodology based on machine learning and data-mining to automatically identify malware development cases from the samples submitted to a malware analysis sandbox. We were able to automatically identify thousands of developments, and to show how the authors modify their programs to test their functionalities or for evading sandboxes. Andrea Lanzi: andrea.lanzi@unimi.it
Malware Analysis Malware Analysis Malicious Infrastruture Needles in a Haystack: Mining Information from Public Dynamic Analysis Sandboxes for Malware Intelligence Try to cluster together binary executable first based on the binary similarity by using ssdep tools. Moreover we considered also time frame based on the developing task . We start from 32,294,094 binaries files and we obtained 5972 clusters containing on average 4.5 elements each . the timeline was 5 year. We also considered the same IP submission and we were able to create 225 macro clusters . Andrea Lanzi: andrea.lanzi@unimi.it
Malware Analysis Malware Analysis Malicious Infrastruture Needles in a Haystack: Mining Information from Public Dynamic Analysis Sandboxes for Malware Intelligence We also performed intra-cluster Analysis and we extract some code-based features based on: code normalization, programming languages, and call-graph and CFG comparison . We then extract other features based on the Antvirus analysis such as: IP from which client was connected to, type of evasion technique, email address used, timesstamp of submission etc. we applied machine learning algorithm and we train a classifier based on the selected features and the system flagged 3038 cluster as a potential development over a six years period . Andrea Lanzi: andrea.lanzi@unimi.it
Malware Analysis Malware Analysis Malicious Infrastruture Needles in a Haystack: Mining Information from Public Dynamic Analysis Sandboxes for Malware Intelligence Campaign Early Submission Time Before Public Disclosure Submitted by Operation Aurora 4 months US ✓ Red October ✓ 8 months Romania APT1 43 months US ✓ Stuxnet ✓ 1 months US Beebus 22 months Germany ✓ LuckyCat ✓ 3 months US BrutePOS 5 months France ✓ NetTraveller ✓ 14 months US Pacific PlugX 12 months US ✓ Pitty Tiger ✓ 42 months US Regin 44 months UK ✓ Equation ✓ 23 months US Andrea Lanzi: andrea.lanzi@unimi.it
Malware Analysis Malware Analysis Malicious Infrastruture Needles in a Haystack: Mining Information from Public Dynamic Analysis Sandboxes for Malware Intelligence This system can be used as an early warning system and can be designed in a way to resistance to the attacker attacks. any public sandboxes can be equipped with a active monitor that is able to detect early malware development and stop the malware propagation. Andrea Lanzi: andrea.lanzi@unimi.it
Malware Analysis Malware Analysis Malicious Infrastruture Q&A Thank You! Q&A? Andrea Lanzi: andrea.lanzi@unimi.it
Recommend
More recommend