visiting the snake nest
play

Visiting the snake nest Recon Brussels 2018 Jean-Ian Boutin | - PowerPoint PPT Presentation

Visiting the snake nest Recon Brussels 2018 Jean-Ian Boutin | Senior Malware Researcher Matthieu Faou | Malware Researcher Jean-Ian Boutin Matthieu Faou Senior Malware Researcher Malware Researcher @jiboutin @matthieu_faou Agenda 1.


  1. Named pipe Communications • Tasks can be forwarded to another node

  2. Named pipe Communications • Tasks can be forwarded to another node

  3. Named pipe Communications • Tasks can be forwarded to another node

  4. Named pipe Communications • Tasks can be forwarded to another node

  5. Named pipe Communications • Tasks can be forwarded to another node

  6. Task configuration file • [CONFIG] • NAME (“cmd.exe” by default) • ARG • RESULT (“ stdout ” by default) • COMPRESSION (“yes” by default) • DELETE (“no” by default)

  7. Kazuar

  8. Overview • .NET backdoor • Crossplatform • Similar in architecture to Carbon • Plugin support • Working directory • Configuration file • Log file • […]

  9. ConfuserEx • LZMA code compression • Anti debug • Control flow obfuscation • Strings obfuscation

  10. ConfuserEx • LZMA code compression • Anti debug • Control flow obfuscation • Strings obfuscation

  11. Gazer/ White Bear https://chocolate80y.deviantart.com/art/bear-snake-149185270

Recommend


More recommend