[Oisf-users] Suricata File Carving - Malware Detection
Kevin Ross
kevross33 at googlemail.com
Sat Apr 9 00:51:18 UTC 2011
Stick with me with this. This is pescanner from the malware cookbook. I have
modified it slightly to have more IAT alerts after reading this
http://www.sans.org/reading_room/whitepapers/malicious/rss/_33649 as it has
a big list of IATs at the end and their malware uses so I added them in (in
this case I would say all those IATs look bad in combination). This was Zeus
with the file carved out a pcap on openpacket.org. You can see the
virtustotal report for the MD5 when I searched for it here
http://www.virustotal.com/file-scan/report.html?id=2f59173cf3842b3a72ac04404ab045c339cbc6f021f24b977a27441ea881e95b-1295056538
Now what I was thinking is if they file_extract options were put into
suricata as was mentioned after the last meeting would it be hard to have
suricata or another tool check IATs, entropy, clamav scan possibly or
checking the MD5 against virustotal, shadowserver etc to determine if is is
possibly malicious? Even the IATs for their possible usage and risk and then
a threshold to then determine if the file is likely bad. If the file was
possible bad then a preprocessor style alert could be generated by suricata
with the relevant information about the file and the possibly malicious file
could be moved to a malicious folder or something to be stored while if the
user wants executables or other files that are not detected as anything or
suspicious could be deleted meaning you have a folder of likely samples for
stuff entering your network. What do people think?
################################################################################
Record 0
################################################################################
Meta-data
================================================================================
File: 16586-000001.exe
Size: 120676 bytes
Type: PE32 executable for MS Windows (GUI) Intel 80386 32-bit
MD5: ded848ed704cf70048b4dd8d7180532a
SHA1: df879f5ef8710bf29ffb534cb9ac0d2372673dcc
ssdeep:
3072:ls/kvZuDEJKyzWZMlKyi/4A01XCxFmLgmBouzUcCy9kDZ:K/8EEJKyuZ/u1+msLuGy9g
Date: 0x4B7C7C09 [Wed Feb 17 23:30:17 2010 UTC]
EP: 0x4047e6 .text 0/4
CRC: Claimed: 0x0, Actual: 0x2932f [SUSPICIOUS]
Resource entries
================================================================================
Name RVA Size Lang Sublang
Type
--------------------------------------------------------------------------------
JZ3NY0 0x85dc 0x1000 LANG_ENGLISH SUBLANG_ENGLISH_US
data
JZ3NY0 0x95dc 0x1000 LANG_ENGLISH SUBLANG_ENGLISH_US
data
JZ3NY0 0xa5dc 0x1000 LANG_ENGLISH SUBLANG_ENGLISH_US
data
JZ3NY0 0xb5dc 0x1000 LANG_ENGLISH SUBLANG_ENGLISH_US
data
JZ3NY0 0xc5dc 0x1000 LANG_ENGLISH SUBLANG_ENGLISH_US
data
JZ3NY0 0xd5dc 0x1000 LANG_ENGLISH SUBLANG_ENGLISH_US
data
JZ3NY0 0xe5dc 0x1000 LANG_ENGLISH SUBLANG_ENGLISH_US
data
JZ3NY0 0xf5dc 0x1000 LANG_ENGLISH SUBLANG_ENGLISH_US
data
JZ3NY0 0x105dc 0x1000 LANG_ENGLISH SUBLANG_ENGLISH_US
data
JZ3NY0 0x115dc 0x1000 LANG_ENGLISH SUBLANG_ENGLISH_US
SysEx File - Lowrey
JZ3NY0 0x125dc 0x1000 LANG_ENGLISH SUBLANG_ENGLISH_US
data
JZ3NY0 0x135dc 0x1000 LANG_ENGLISH SUBLANG_ENGLISH_US
DBase 3 data file with memo(s)
JZ3NY0 0x145dc 0x1000 LANG_ENGLISH SUBLANG_ENGLISH_US
data
JZ3NY0 0x155dc 0x1000 LANG_ENGLISH SUBLANG_ENGLISH_US
data
JZ3NY0 0x165dc 0x1000 LANG_ENGLISH SUBLANG_ENGLISH_US
data
JZ3NY0 0x175dc 0x1000 LANG_ENGLISH SUBLANG_ENGLISH_US
data
JZ3NY0 0x185dc 0xa00 LANG_ENGLISH SUBLANG_ENGLISH_US
data
JZ3NY0 0x18fdc 0x1000 LANG_ENGLISH SUBLANG_ENGLISH_US
data
JZ3NY0 0x19fdc 0x1000 LANG_ENGLISH SUBLANG_ENGLISH_US
data
JZ3NY0 0x1afdc 0x1000 LANG_ENGLISH SUBLANG_ENGLISH_US
data
JZ3NY0 0x1bfdc 0x1000 LANG_ENGLISH SUBLANG_ENGLISH_US
data
JZ3NY0 0x1cfdc 0x1000 LANG_ENGLISH SUBLANG_ENGLISH_US
data
JZ3NY0 0x1dfdc 0x1000 LANG_ENGLISH SUBLANG_ENGLISH_US
data
JZ3NY0 0x1efdc 0x1000 LANG_ENGLISH SUBLANG_ENGLISH_US
data
SETTINGS 0x1ffdc 0x6e LANG_ENGLISH SUBLANG_ENGLISH_US
data
RT_VERSION 0x2004c 0x2cc LANG_ENGLISH SUBLANG_ENGLISH_US
data
Suspicious IAT alerts
================================================================================
IsDebuggerPresent
ReadProcessMemory
WriteProcessMemory
LoadLibraryA
Sections
================================================================================
Name VirtAddr VirtSize RawSize Entropy
--------------------------------------------------------------------------------
.text 0x1000 0x396c 0x3a00 5.696497
.rdata 0x5000 0x690 0x800 4.412936
.data 0x6000 0x13d4 0x800 6.048607
.rsrc 0x8000 0x18318 0x18400 7.987794 [SUSPICIOUS]
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.openinfosecfoundation.org/pipermail/oisf-users/attachments/20110409/e88914c3/attachment-0002.html>
More information about the Oisf-users
mailing list