uncovering and visualizing botnet infrastructure and
play

UNCOVERING AND VISUALIZING BOTNET INFRASTRUCTURE AND BEHAVIOR - PowerPoint PPT Presentation

UNCOVERING AND VISUALIZING BOTNET INFRASTRUCTURE AND BEHAVIOR ANDREA SCARFO (SECURITY RESEARCHER) Security Research Analyst @ Cisco Umbrella (formerly OpenDNS) in San Francisco since 2015 Previously a System Administrator for 12 years JOSH


  1. DGA Archive provides regex lookups to find similar patterns

  2. Hash Samples uploaded by community, honeypots and malware authors

  3. FEEDS

  4. hfjrlydjpponowxnlq.com

  5. isctdtaulbpoprun.pw

  6. lkvxmbtxsbiqp.com

  7. UNCOVERING INFRASTRUCTURE

  8. IOCS

  9. IOCs SEEN THROUGHOUT THE BOT LIFECYCLE DOMAIN NAMES C&C communications DGAs - resolving and NX domains 
 IP ADDRESSES Hosting IPs 
 NAMSERVERS, EMAIL REGISTRANT WHOIS Information 
 HASHES OF MALICIOUS BINARIES Dropped by RATS Contained in Spam Dropped by compromised websites or malvertising

  10. CLEANING THE DATA

  11. Process data and organize

  12. Process data and organize Still A Pain To Look At

  13. Visually map hash to domain

  14. Visually map TTL to domain

  15. Clean data for useful visuals That doesn’t look right

  16. MONGO DB We sent data to mongo for historical lookups

  17. CLEANING DATA ‣ 175 IPs related to botnet C&C servers over a 1 month period

  18. UNCOVERING BEHAVIOR

  19. Looking at a list of IP’s isn’t immediately useful

  20. CLEANING DATA ‣ Relationships between other indicators can develop intelligence on attack and botnet infrastructure

  21. ▸ Which behavior features would be interesting? ▸ lat/lon ▸ how many clients are visiting? ▸ the first seen date of a particular ioc ▸ connected infrastructure : ips, asns, domains, namerserver

  22. CLEANING DATA ‣ Some are not connected and need cleaned out 127.0.0.1 8.8.8.8 255* Get rid of data that doesn’t help

  23. This domain points to a reserved IP

  24. CLEANING DATA ‣ Some IPs are usually compromised webservers used to proxy/hide the C&C communications

  25. Using Necurs as an example NECURS BOTNET

  26. NECURS BOTNET INSIDE STORY ‣ Infection Method ‣ Spam with malicious attachments ‣ Malvertising ‣ Exploit Kits ‣ Malicious links in emails

  27. NECURS BOTNET INSIDE STORY ‣ Prominent Malware ‣ Ransomware ‣ Banking Trojans

  28. NECURS BOTNET INSIDE STORY Noteworthy DDoS ability Uses 2 DGAs in effort to keep communications secret

  29. CO-OCCURRING DGAS AND HOSTING IPS

  30. We’ll show some examples using the OpenSource tool: OpenGraphiti (and networkx/ symanticnet python libs)

  31. View of OpenGraphiti output

  32. Co-occuring dga domains: IP’s and email registrants

  33. Another view

  34. Co-occuring dga domains: IP Location data

  35. ATTACK CAMPAIGNS

  36. Using Globeimposter as an example GLOBEIMPOSTER

  37. HAILSTORM SPAM BOT SENDS GLOBEIMPOSTER ▸ dategs[.]ru/js/tasok11[.]exe - from a hailstorm spam bot - 182.56.129.116 - Passive DNS

  38. Timeline of Domain use

  39. HAILSTORM SPAM BOT SENDS GLOBEIMPOSTER ▸ 420855ef0326743f46da71127620be22089152c 9029ba450d4f4679b8a8a122d - globeimposter

Recommend


More recommend