Malware
CS155 Spring 2009
Elie Bursztein
Welcome to the zoo
• What malware are
• How do they infect hosts
• How do they hide
• How do they propagate
• Zoo visit !
• How to detect them
• Worms
What is a malware ?
A Malware is a set of instructions that run
on your computer and make your system
do something that an attacker wants it to
do.
What it is good for ?
• Steal personal information
• Delete files
• Click fraud
• Steal software serial numbers
• Use your computer as relay
A recent illustration
• Christians On
Facebook
• Leader hacked on
march 2009
• Post Islamic
message
• Lost >10 000
members
The Malware Zoo
• Virus
• Backdoor
• Trojan horse
• Rootkit
• Scareware
• Adware
• Worm
What is a Virus ?
a program that can infect other programs
by modifying them to include a, possibly
evolved, version of itself
Fred Cohen 1983
Some Virus Type
• Polymorphic : uses a polymorphic
engine to mutate while keeping the
original algorithm intact (packer)
• Methamorpic : Change after each
infection
What is a trojan
A trojan describes the class of malware that
appears to perform a desirable function but in
fact performs undisclosed malicious functions
that allow unauthorized access to the victim
computer
Wikipedia
What is rootkit
A root kit is a component that uses stealth
to maintain a persistent and undetectable
presence on the machine
Symantec
What is a worm
A computer worm is a self-replicating
computer program. It uses a network to send
copies of itself to other nodes and do so
without any user intervention.
Almost 30 years of Malware
From Malware fighting m
History
• 1981 First reported virus : Elk Cloner (Apple 2)
• 1983 Virus get defined
• 1986 First PC virus MS DOS
• 1988 First worm : Morris worm
• 1990 First polymorphic virus
• 1998 First Java virus
• 1998 Back orifice
• 1999 Melissa virus
• 1999 Zombie concept
• 1999 Knark rootkit
• 2000 love bug
Melissa spread by email and share
Knark rootkit made by creed demonstrate the first ideas
love bug vb script that abused a weakness in outlook
Kernl intrusion by optyx gui and efficent hidding mechanims
Number of malware
signatures
Symantec report 2009
Malware Repartition
Panda Q1 report 2009
Infection methods
Outline
• What malware are
• How do they infect hosts
• How do they propagate
• Zoo visit !
• How to detect them
• Worms
What to Infect
• Executable
• Interpreted file
• Kernel
• Service
• MBR
• Hypervisor
Overwriting malware
Targeted
Executable
Malware
Malware
prepending malware
Targeted
Executable
Malware
Infected
host
Executable
Malware
appending malware
Targeted
Executable
Malware
Infected
host
Executable
Malware
Cavity malware
Targeted
Executable Infected
host
Executable
Malware
Malware
Multi-Cavity malware
Targeted
Executable
Malware
Malware
Malware
Malware
Packers
Malware
Infected host
Executable
Packer
Payload
Packer functionalities
• Compress
• Encrypt
• Randomize (polymorphism)
• Anti-debug technique (int / fake jmp)
• Add-junk
• Anti-VM
• Virtualization
Auto start
• Folder auto-start : C:Documents and Settings[user_name]Start
MenuProgramsStartup
• Win.ini : run=[backdoor]" or
"load=[backdoor]".
• System.ini : shell=”myexplorer.exe”
• Wininit
• Config.sys
Auto start cont.
• Assign know extension (.doc) to the
malware
• Add a Registry key such as
HKCUSOFTWAREMicrosoftWindows CurrentVersionRun
• Add a task in the task scheduler
• Run as service
Unix autostart
• Init.d
• /etc/rc.local
• .login .xsession
• crontab
• crontab -e
• /etc/crontab
Macro virus
• Use the builtin script engine
• Example of call back used (word)
• AutoExec()
• AutoClose()
• AutoOpen()
• AutoNew()
Document based malware
• MS Office
• Open Office
• Acrobat

More Related Content

PPT
10-malware and online safety preacuations
PPT
Malware
PPTX
Module_09_Malware_Presentation_for_IT500.pptx
PPT
Senior seminar virus
PPT
Spreading virus
PPTX
Common malware and countermeasures
PPT
PPTX
Computer Virus
10-malware and online safety preacuations
Malware
Module_09_Malware_Presentation_for_IT500.pptx
Senior seminar virus
Spreading virus
Common malware and countermeasures
Computer Virus

Similar to 10-malware.ppt (20)

PPT
Computer virus
PPT
Computer virus
PPT
PPT
computer virus with full detail
PPTX
Viruses & worms
PPTX
Computer Viruses
PPT
Virus09
PDF
Codigo Malicioso
PPT
Computer Virus And Antivirus-Sumon Chakraborty
PPTX
History of Computer Virus
PPT
PPTX
Malware and Anti-Malware Seminar by Benny Czarny
PPTX
Malware: To The Realm of Malicious Code (Training)
PDF
PPT
Computer virus
DOC
Malware
DOC
Malware
PPTX
Virus and Worms
PPT
computer vipin kumar ppt
Computer virus
Computer virus
computer virus with full detail
Viruses & worms
Computer Viruses
Virus09
Codigo Malicioso
Computer Virus And Antivirus-Sumon Chakraborty
History of Computer Virus
Malware and Anti-Malware Seminar by Benny Czarny
Malware: To The Realm of Malicious Code (Training)
Computer virus
Malware
Malware
Virus and Worms
computer vipin kumar ppt
Ad

Recently uploaded (20)

PDF
Climate and Adaptation MCQs class 7 from chatgpt
PDF
Compact First Student's Book Cambridge Official
PDF
International_Financial_Reporting_Standa.pdf
PPTX
What’s under the hood: Parsing standardized learning content for AI
PDF
MA in English at Shiv Nadar University – Advanced Literature, Language & Rese...
PDF
fundamentals-of-heat-and-mass-transfer-6th-edition_incropera.pdf
PPTX
Macbeth play - analysis .pptx english lit
PDF
Everyday Spelling and Grammar by Kathi Wyldeck
PDF
Farming Based Livelihood Systems English Notes
PDF
Environmental Education MCQ BD2EE - Share Source.pdf
PDF
MICROENCAPSULATION_NDDS_BPHARMACY__SEM VII_PCI Syllabus.pdf
PDF
Nurlina - Urban Planner Portfolio (english ver)
PDF
English-bài kiểm tra tiếng anh cơ bản.pdf
PDF
LIFE & LIVING TRILOGY - PART (3) REALITY & MYSTERY.pdf
PDF
LIFE & LIVING TRILOGY- PART (1) WHO ARE WE.pdf
PDF
Journal of Dental Science - UDMY (2022).pdf
PDF
LEARNERS WITH ADDITIONAL NEEDS ProfEd Topic
PDF
Journal of Dental Science - UDMY (2020).pdf
PPTX
UNIT_2-__LIPIDS[1].pptx.................
PDF
semiconductor packaging in vlsi design fab
Climate and Adaptation MCQs class 7 from chatgpt
Compact First Student's Book Cambridge Official
International_Financial_Reporting_Standa.pdf
What’s under the hood: Parsing standardized learning content for AI
MA in English at Shiv Nadar University – Advanced Literature, Language & Rese...
fundamentals-of-heat-and-mass-transfer-6th-edition_incropera.pdf
Macbeth play - analysis .pptx english lit
Everyday Spelling and Grammar by Kathi Wyldeck
Farming Based Livelihood Systems English Notes
Environmental Education MCQ BD2EE - Share Source.pdf
MICROENCAPSULATION_NDDS_BPHARMACY__SEM VII_PCI Syllabus.pdf
Nurlina - Urban Planner Portfolio (english ver)
English-bài kiểm tra tiếng anh cơ bản.pdf
LIFE & LIVING TRILOGY - PART (3) REALITY & MYSTERY.pdf
LIFE & LIVING TRILOGY- PART (1) WHO ARE WE.pdf
Journal of Dental Science - UDMY (2022).pdf
LEARNERS WITH ADDITIONAL NEEDS ProfEd Topic
Journal of Dental Science - UDMY (2020).pdf
UNIT_2-__LIPIDS[1].pptx.................
semiconductor packaging in vlsi design fab
Ad

10-malware.ppt

Editor's Notes

  • #27: more like autoexec.bat etc