Pattern-Based Approach for In-Memory ShellCodes Detection

Pattern-Based Approach for In-Memory ShellCodes Detection

This topic has been dealt in one of my last technical articles. The document shows as it’s possible to approach an incident investigation on the basis of common instructions used by shellcodes to achieve their goals. The analysis is conducted within a memory dump. In this regard have been developed some yara custom rules that can be used as an aid for experienced analyst to quickly locate malicious code. Note, however, that this is a very wide topic (have you ever heard of padding, permutations, … [Read more]

Meeting with a Chinese Malware

Meeting with a Chinese Malware

This evening I received an email with an attached zip. This email was very well made and my anti-virus did not detect anything dangerous -_- veeeery nice…i decided to take a look and see what strange monster was inside :] The executable is a trojan/downloader packed with something custom! After recovering the original executable bypassing all protections, i  was able to have a look within it and immediately i saw some interesting functions … [Read more]

Steganography and Steganalysis: Common Image Formats and LSB

Steganography and Steganalysis: Common Image Formats and LSB

 Thousands and thousands of data items currently are riding the Internet every day; their representation could be a continuous stream of data transiting through the entire globe. With the growth in quantity and especially in the importance of such informations, the need to adopt systems designed to guarantee a good level of protection and security has also grown in proportion. This paper explores those that are the common steganographic algorithms used to hide informations within seemingly … [Read more]

Red October: Cyber-Espionage ToolKit Analysis

Red October: Cyber-Espionage ToolKit Analysis

Reb October is the name of a cyber-espionage toolkit discovered by Kaspersky Lab. The malware was operating worldwide for up to 5 years before to be discovered, transmitting to its C&C servers a lot of informations. Red October is considered an advanced cyber-espionage campaign intended to targeting diplomatic, governmental and financial organizations. This is an analysis conducted by me on 01/13 for InfoSec Institute but published but published after a little... It's possible to view my … [Read more]

SANS DFIRCON APT Malware Challenge

SANS DFIRCON APT Malware Challenge

 SANS DFIRCON is a challenge where we have to download a memory image from SANS and perform over it a complete forensic analysis in order to find the real chinese APT hidden inside and so to answer to five questions about it; These questions may be very similar to: What's the PID of the rogue process ? How is the malware achieving persistence on the system ? What is the name of the file that caused the infection of the system ? If you think to be able to answer, download the image and hunt the … [Read more]

Anti-Forensics Techniques

Anti-Forensics Techniques

The following paper takes into consideration those that are the most common methods to prevent or to render unreliable the techniques used for forensic analysis applied to magnetic media in order to gather useful 'evidences' for a computer crime related investigation. The research is focused on topics like data hiding, data obfuscation, encryption, code injection and also online anonymity.  The full English version can be viewed on InfoSec Institute website by clicking on logo … [Read more]