ycliper

Популярное

Музыка Кино и Анимация Автомобили Животные Спорт Путешествия Игры Юмор

Интересные видео

2025 Сериалы Трейлеры Новости Как сделать Видеоуроки Diy своими руками

Топ запросов

смотреть а4 schoolboy runaway турецкий сериал смотреть мультфильмы эдисон
Скачать

DEF CON 25 - Patrick Wardle - Offensive Malware Analysis: Dissecting OSX FruitFly

Автор: DEFCONConference

Загружено: 2017-09-07

Просмотров: 25724

Описание: Creating a custom command and control (C&C) server for someone else's malware has a myriad of benefits. If you can take over it a domain, you then may able to fully hijack other hackers' infected hosts. A more prosaic benefit is expediting analysis. While hackers and governments may be more interested in the former, malware analysts can benefit from the later

FruitFly, the first OS X/macOS malware of 2017, is a rather intriguing specimen. Selectively targeting biomedical research institutions, it is thought to have flown under the radar for many years. In this talk, we'll focus on the 'B' variant of FruitFly that even now, is only detected by a handful of security products.

We'll begin by analyzing the malware's dropper, an obfuscated perl script. As this language is rather archaic and uncommon in malware droppers, we'll discuss some debugging techniques and fully deconstruct the script.

While this dropper component also communicates with the C&C server and supports some basic commands, it drops a binary payload in order to perform more complex actions. However, instead of fully reversing this piece of the malware, the talk will focus on an initial triage and show how this was sufficient for the creation of a custom C&C server. With such a server, we can easily coerce the malware to reveal it's full capabilities. For example, the malware invokes a handful of low-level mouse & graphics APIs, passing in a variety of dynamic parameters. Instead of spending hours reversing and debugging this complex code, via the C&C server, we can simply send it various commands and observe the effects.

Of course this approach hinges on the ability to closely observe the malware's actions. As such, we'll discuss macOS-specific tools that can monitor various events, and where necessary detail the creation of custom ones (e.g. a 'mouse sniffer' that locally observes and decodes commands sent from the malware to the OS, in order to control the mouse).

While some of this talk is FruitFly and/or macOS specific, conceptually it should broadly apply to analyzing other malware, even on other operating systems :)

Не удается загрузить Youtube-плеер. Проверьте блокировку Youtube в вашей сети.
Повторяем попытку...
DEF CON 25 - Patrick Wardle - Offensive Malware Analysis: Dissecting OSX FruitFly

Поделиться в:

Доступные форматы для скачивания:

Скачать видео

  • Информация по загрузке:

Скачать аудио

Похожие видео

DEF CON 31 - The Art of Compromising C2 Servers  A Web App Vulns Perspective - Vangelis Stykas

DEF CON 31 - The Art of Compromising C2 Servers A Web App Vulns Perspective - Vangelis Stykas

DEF CON 25 - Professor Plum - Digital Vengeance  Exploiting the Most Notorious C&C Toolki

DEF CON 25 - Professor Plum - Digital Vengeance Exploiting the Most Notorious C&C Toolki

Mozi Malware - Finding Breadcrumbs...

Mozi Malware - Finding Breadcrumbs...

DEF CON 23 - Chris Domas - Repsych: Psychological Warfare in Reverse Engineering

DEF CON 23 - Chris Domas - Repsych: Psychological Warfare in Reverse Engineering

DEF CON 30 - Tomer Bar - OopsSec -The bad, the worst and the ugly of APT’s operations security

DEF CON 30 - Tomer Bar - OopsSec -The bad, the worst and the ugly of APT’s operations security

DEF CON 26 - zerosum0x0 - Demystifying MS17 010 Reverse Engineering the ETERNAL Exploits

DEF CON 26 - zerosum0x0 - Demystifying MS17 010 Reverse Engineering the ETERNAL Exploits

.kkrieger - Инженерное Безумие Размером 96KB

.kkrieger - Инженерное Безумие Размером 96KB

Как власть следит за россиянами в интернете?

Как власть следит за россиянами в интернете?

Reversing WannaCry Part 1 - Finding the killswitch and unpacking the malware in #Ghidra

Reversing WannaCry Part 1 - Finding the killswitch and unpacking the malware in #Ghidra

DEF CON 25 - Mark Williams, Rob Stanley - If You Give a Mouse a Microchip

DEF CON 25 - Mark Williams, Rob Stanley - If You Give a Mouse a Microchip

Meshtastic в России: законно ли использовать?

Meshtastic в России: законно ли использовать?

Shawn Thomas - An Introduction To Malware Analysis video - DEF CON 27 Blue Team Village

Shawn Thomas - An Introduction To Malware Analysis video - DEF CON 27 Blue Team Village

DEF CON 23 - Patrick Wardle  - DLL Hijacking on OS X

DEF CON 23 - Patrick Wardle - DLL Hijacking on OS X

Patrick Wardle - Harnessing Weapons of Mac Destruction - DEF CON 27 Conference

Patrick Wardle - Harnessing Weapons of Mac Destruction - DEF CON 27 Conference

ВСЕ ЧТО НУЖНО ЗНАТЬ ПРО LINUX

ВСЕ ЧТО НУЖНО ЗНАТЬ ПРО LINUX

Malware Analysis With Ghidra - Stuxnet Analysis

Malware Analysis With Ghidra - Stuxnet Analysis

DEF CON 25 - Mikhail Sosonkin - Hacking travel routers like it's 1999

DEF CON 25 - Mikhail Sosonkin - Hacking travel routers like it's 1999

DEFCON 17: Making Fun of Your Malware

DEFCON 17: Making Fun of Your Malware

DEF CON 33 - Невозможно остановить ROP: автоматизация универсальных обходов ASLR - Брэмвелл Бризе...

DEF CON 33 - Невозможно остановить ROP: автоматизация универсальных обходов ASLR - Брэмвелл Бризе...

Ransomware Analysis: 1 - WannaCry

Ransomware Analysis: 1 - WannaCry

© 2025 ycliper. Все права защищены.



  • Контакты
  • О нас
  • Политика конфиденциальности



Контакты для правообладателей: [email protected]