Bypassing antivirus detection with encryption University of Piraeus Department of Digital Systems
Transcription
Bypassing antivirus detection with encryption University of Piraeus Department of Digital Systems
University of Piraeus Department of Digital Systems «Security of Digital Systems» Bypassing antivirus detection with encryption Tasiopoulos Vasilis Supervisor: Sokratis Katsikas About Me Studied at University of Piraeus Informatics Security in Digital Systems Currently working KPMG as a IT Advisor and Penetration tester Contents Related Research Background Knowledge-Antivirus Crypter Background Knowledge-Portable executable Background Knowledge-Portable Executable Loader RunPE and Injection Our Implementation Results Why? It is easier to change crypter It is harder to change ALL malwares Who can use it: Penetration Tests Anyone for Legitimate purpose Related Research Implementation of Runtime Crypter by Christian Ammann Packing Heat by Dimitrios A. Glynos The Crypter BluePrint by crypters.net Several tutorial on HackForums.net Background Knowledge - Antivirus Signature-based detection: Traditionally, antivirus software heavily relied on signatures to identify malware. Heuristics: Another technique used in antivirus software is the use of heuristic analysis to identify new malware or variants of known malware. Real-time protection: Newer antivirus software also has another mechanism called “real time” protection. It is known that some (malicious) code may be hidden, encrypted, obfuscated or even created instantly. To be able to deal with such tricks antivirus packages are also capable of monitoring and intercepting API calls and of performing a kind of "behavioral analysis". So, if a well-known process acts in an unusual manner the antivirus will mark it as suspicious. Crypters: Types and behavior Types: • Runtime • Scantime Options • Internal Stub • External Stub Crypter must: • Encrypt Crypter’s behavior Stub must: • Decrypt • Execute malware Stub options: • Save in directory • Load it in memory • Load it in stub’s process • Load in new process • Inject into another process (optimal) RunPE and Injection Method discovered by T.keong Injection: The stub is executed A new process is created in "suspended" state The Stub decrypts the malware The stub load the malware in the place of the suspended legitimate process The process is unsuspended. Limitation: 32 bit process or 64 bit process Not in both Different Implementations: Alternative way to call Apis Use of undocumented Apis Our Implementation Crypter’s Type Runtime Crypter External Stub Developed C# Visual Studio 2500 lines of code Encryption AES Architecture 1. User Selects the malware 11. Adding Hide code to stub (optional) 3. Crypter reads the malware byte per byte 4. Encrypting malware 5. Crypter reads the Stub 13. 14. 15. 16. 17. 2. User configures the available options (optional) 12. Removing comments from stub Adding Fake message to stub (optional) Adding Junk Code to stub (optional) Adding Fake Apis to stub (optional) Add decompression code to stub (optional) Adding Addi-… code to stub (optional) 18. Randomizing class, function, 7. Encrypting injection path variable names and add them to 8. Adding injection process path to stub stub and to RunPE 9. Reading selected RunPE 19. Adding Encryption Key to stub 6. Adding assembly info to stub (optional) 10. Adding startup code to stub (optional) Architecture 20. Compiling RunPE as DLL 21. Reading DLL 22. Encrypting DLL 23. Compressing encrypted DLL(optional) 24. Adding encrypted Malware and DLL ass resources to stub 25. Adding Icon to stub(optional) 26. Compiling Stub as executable 27. Adding Eof data to executable (optional) Architecture Stub after execution: Read Encrypted DLL Decrypt DLL Load DLL in memory Read Encrypted malware Decrypt malware Call DLL for decrypted malware Malware inject to another process Architecture Key Points Unique code Injection implemented in encrypted DLL Random Function Names, Class names, Variable names Encrypted Strings Result: Unique Executable Crypters GUI and Options Crypters GUI and Options Crypters GUI and Options Results The lab: Windows XP 32/64 bit - Avast/AVG Windows Vista 32/64 bit – Kaspersky/Norton Windows 7 32/64 bit –Microsoft Security Essential/ESET Online Scanner http://nodistribute.com https://www.metascan-online.com Files Tested Netcat.exe Darkomet malware Poison Ivy Results Virus Injection Method Windows Version RunPE Choice Working Darkcomet CSC 32bit 3 YES 0/40 Darkcomet CSC 64bit 3 YES 0/40 Darkcomet CSC 32bit 2 YES 0/40 Darkcomet CSC 64bit 2 YES 0/40 Darkcomet CSC 32bit 5 YES 0/40 Darkcomet CSC 64bit 5 YES 0/40 Darkcomet CSC 32bit 6 YES 0/40 Darkcomet CSC 64bit 6 YES 0/40 Darkcomet Default Browser 32bit 5 YES 0/40 Mozilla Darkcomet Default Browser 64bit 5 YES 0/40 Mozilla/Chrome Darkcomet Default Browser 32bit 5 YES 0/40 Internet explorer Darkcomet Default Browser 64bit 5 YES 0/40 Internet explorer Darkcomet svchost 32bit 5 YES 0/40 Darkcomet svchost 64bit 5 YES 0/40 Detection Notes
Similar documents
Create Employee Professional Pay Stubs Online
Create professional employee pay stubs online at paystubsnow.com. Build your own pay stub by using online tools. We give you the alternative to send your pay stubs on valid payroll paper used by business right with free shipping. Visit Us: https://paystubsnow.com/
More information