[Oisf-users] Suricata File Carving - Malware Detection

Kevin Ross kevross33 at googlemail.com
Sat Apr 9 00:51:18 UTC 2011


Stick with me with this. This is pescanner from the malware cookbook. I have
modified it slightly to have more IAT alerts after reading this
http://www.sans.org/reading_room/whitepapers/malicious/rss/_33649 as it has
a big list of IATs at the end and their malware uses so I added them in (in
this case I would say all those IATs look bad in combination). This was Zeus
with the file carved out a pcap on openpacket.org. You can see the
virtustotal report for the MD5 when I searched for it here
http://www.virustotal.com/file-scan/report.html?id=2f59173cf3842b3a72ac04404ab045c339cbc6f021f24b977a27441ea881e95b-1295056538

Now what I was thinking is if they file_extract options were put into
suricata as was mentioned after the last meeting would it be hard to have
suricata or another tool check IATs, entropy, clamav scan possibly or
checking the MD5 against virustotal, shadowserver etc to determine if is is
possibly malicious? Even the IATs for their possible usage and risk and then
a threshold to then determine if the file is likely bad. If the file was
possible bad then a preprocessor style alert could be generated by suricata
with the relevant information about the file and the possibly malicious file
could be moved to a malicious folder or something to be stored while if the
user wants executables or other files that are not detected as anything or
suspicious could be deleted meaning you have a folder of likely samples for
stuff entering your network. What do people think?

################################################################################
Record 0
################################################################################

Meta-data
================================================================================
File:     16586-000001.exe
Size:    120676 bytes
Type:    PE32 executable for MS Windows (GUI) Intel 80386 32-bit
MD5:     ded848ed704cf70048b4dd8d7180532a
SHA1:    df879f5ef8710bf29ffb534cb9ac0d2372673dcc
ssdeep:
3072:ls/kvZuDEJKyzWZMlKyi/4A01XCxFmLgmBouzUcCy9kDZ:K/8EEJKyuZ/u1+msLuGy9g
Date:    0x4B7C7C09 [Wed Feb 17 23:30:17 2010 UTC]
EP:      0x4047e6 .text 0/4
CRC:     Claimed: 0x0, Actual: 0x2932f [SUSPICIOUS]

Resource entries
================================================================================
Name               RVA      Size     Lang         Sublang
Type
--------------------------------------------------------------------------------
JZ3NY0             0x85dc   0x1000   LANG_ENGLISH SUBLANG_ENGLISH_US
data
JZ3NY0             0x95dc   0x1000   LANG_ENGLISH SUBLANG_ENGLISH_US
data
JZ3NY0             0xa5dc   0x1000   LANG_ENGLISH SUBLANG_ENGLISH_US
data
JZ3NY0             0xb5dc   0x1000   LANG_ENGLISH SUBLANG_ENGLISH_US
data
JZ3NY0             0xc5dc   0x1000   LANG_ENGLISH SUBLANG_ENGLISH_US
data
JZ3NY0             0xd5dc   0x1000   LANG_ENGLISH SUBLANG_ENGLISH_US
data
JZ3NY0             0xe5dc   0x1000   LANG_ENGLISH SUBLANG_ENGLISH_US
data
JZ3NY0             0xf5dc   0x1000   LANG_ENGLISH SUBLANG_ENGLISH_US
data
JZ3NY0             0x105dc  0x1000   LANG_ENGLISH SUBLANG_ENGLISH_US
data
JZ3NY0             0x115dc  0x1000   LANG_ENGLISH SUBLANG_ENGLISH_US
SysEx File - Lowrey
JZ3NY0             0x125dc  0x1000   LANG_ENGLISH SUBLANG_ENGLISH_US
data
JZ3NY0             0x135dc  0x1000   LANG_ENGLISH SUBLANG_ENGLISH_US
DBase 3 data file with memo(s)
JZ3NY0             0x145dc  0x1000   LANG_ENGLISH SUBLANG_ENGLISH_US
data
JZ3NY0             0x155dc  0x1000   LANG_ENGLISH SUBLANG_ENGLISH_US
data
JZ3NY0             0x165dc  0x1000   LANG_ENGLISH SUBLANG_ENGLISH_US
data
JZ3NY0             0x175dc  0x1000   LANG_ENGLISH SUBLANG_ENGLISH_US
data
JZ3NY0             0x185dc  0xa00    LANG_ENGLISH SUBLANG_ENGLISH_US
data
JZ3NY0             0x18fdc  0x1000   LANG_ENGLISH SUBLANG_ENGLISH_US
data
JZ3NY0             0x19fdc  0x1000   LANG_ENGLISH SUBLANG_ENGLISH_US
data
JZ3NY0             0x1afdc  0x1000   LANG_ENGLISH SUBLANG_ENGLISH_US
data
JZ3NY0             0x1bfdc  0x1000   LANG_ENGLISH SUBLANG_ENGLISH_US
data
JZ3NY0             0x1cfdc  0x1000   LANG_ENGLISH SUBLANG_ENGLISH_US
data
JZ3NY0             0x1dfdc  0x1000   LANG_ENGLISH SUBLANG_ENGLISH_US
data
JZ3NY0             0x1efdc  0x1000   LANG_ENGLISH SUBLANG_ENGLISH_US
data
SETTINGS           0x1ffdc  0x6e     LANG_ENGLISH SUBLANG_ENGLISH_US
data
RT_VERSION         0x2004c  0x2cc    LANG_ENGLISH SUBLANG_ENGLISH_US
data

Suspicious IAT alerts
================================================================================
IsDebuggerPresent
ReadProcessMemory
WriteProcessMemory
LoadLibraryA

Sections
================================================================================
Name       VirtAddr     VirtSize     RawSize      Entropy
--------------------------------------------------------------------------------
.text      0x1000       0x396c       0x3a00       5.696497
.rdata     0x5000       0x690        0x800        4.412936
.data      0x6000       0x13d4       0x800        6.048607
.rsrc      0x8000       0x18318      0x18400      7.987794    [SUSPICIOUS]
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.openinfosecfoundation.org/pipermail/oisf-users/attachments/20110409/e88914c3/attachment-0002.html>


More information about the Oisf-users mailing list