SlideShare a Scribd company logo
Visualizing your Honeypot Data
   Wasim Halani
    ◦ Security Analyst @ Network Intelligence India
      (http://www.niiconsulting.com/)
    ◦ Interests
      Exploit development
      Malware Analysis
   Harsh Patel
    ◦ Student @ Symbiosis center for Information
      technology.
    ◦ Interest
      Anything and everything about security
   A deliberately vulnerable system, placed on
    the network
    ◦ Lure attackers towards itself
    ◦ Capture the malwares sent to the network/system
    ◦ Help in offline analysis
   Types
    ◦ Low Interaction
    ◦ High Interaction
   NepenthesFE is a front end to the low
    interaction honeypot ‘nepenthes’

   Originally developed by Emre Bastuz

   Helps in cataloguing malware collected using
    nepenthes

   Has modules which performs operations to
    automate some aspects of malware analysis
   Our Nepenthes honeypot provided only
    minimal data about the captured binaries
    ◦   File hash (MD5)
    ◦   Attacker IP
    ◦   File Name
    ◦   ...
   What next?
   Is that all the value a honeypot can provide?
   Lenny Zeltser
    ◦ ‘What to include in a Malware Analysis Report?’
      http://zeltser.com/reverse-malware/malware-analysis-report.html

   Summary of Analysis
   Identification
   Characteristics
   Dependencies
   Behavioral & Code Analysis
   Screenshots
   Recommendations
   Once we have captured the binary, we’re still
    left with doing the routine basic stuff
    ◦ strings, file, virustotal, geo-ip ...


   Can’t we automate it!?

   Enter ‘NepenthesFE’
    ◦ Basic analysis like filetype, hashes, ASCII strings,
      packer information, geographical information
Analyzing malware sample
         ‘b.aaa’
   Provide a statistical output of data collected
    ◦ How many times has ‘a’ malware hit us?

   Provide visualization of origin of malware
    ◦ Which malwares originate from a single country

   To determine and focus on the number of new
    attacks on to the system

   Provide a framework to automate initial static
    analysis
    ◦ Is it packed?
    ◦ Any recognizable ASCII strings in the binary
Real-Time Static Malware Analysis using NepenthesFE
   Integrate with the Nepenthes honeypot
    ◦ Integration with multiple sensors possible
   Statistical count of malware hits
   AfterGlow diagrams
    ◦ Country of Origin
    ◦ ASN
   Provide details of the attacking IP
    ◦ GEO IP database
    ◦ Google maps
   Can be extended with custom modules for
    static malware analysis on real time
    ◦ Packer Information
    ◦ ‘Strings’

   Anti-virus scanning (for known malwares)
   Based on Sample (malware)
    ◦ VirusTotal Scanning
      API
    ◦ Bit defender scanning
    ◦ Unix based commands execution like File,
      objdump, UPX and string
    ◦ *nix based custom script execution to find out
      details like Packer Information, PE information
      and entropy analyser
   Based on Instance (Information about the
    attacker)
    ◦ GEO IP database
    ◦ ASN Information
      Mapping of ASN to Robtex
       Mapping of ASN to Phishtank
       Visualization of attack vectors from a ASN
        number
    ◦ Visualisation of attack vectors from a IP address
Real-Time Static Malware Analysis using NepenthesFE
Real-Time Static Malware Analysis using NepenthesFE
   Install Nepenthes Honeypot sensor
      http://nepenthes.carnivore.it/
   Refer to our first report at IHP
      http://www.honeynet.org.in/reports/KK_Project1.pdf
   List of packages are :-
    ◦   Build essentials
    ◦   Apache2
    ◦   Libapache2-mod-php5
    ◦   phppear
    ◦   Mysql-server-5.1
    ◦   Php5-msql
    ◦   Php5-mhash
    ◦   Php5-dev
    ◦   Upx-ucl
    ◦   File
   List of packages are :-
    ◦ geoip-bin
    ◦ rrdtool                       (for Graphs)
    ◦ Librrd2                       (for Graphs)
    ◦ Librrd2-dev                   (for Graphs)
    ◦ Python-pefile                 (for Pefile module)
    ◦ Python-all                    (for Pefile module)
    ◦ Bitdefender-scanner           (for bit-defender
      scanning)
    ◦ graphviz                      (for visualization)

    And Lots of Configuration....
   Modify the ‘submit-http.conf’ file in
    /etc/nepenthes
   Download the freely available database from
    MaxMind
    ◦ http://www.maxmind.com/download/geoip/database/GeoLiteCity.dat.gz
   Get the Google API Key
      http://code.google.com/apis/maps/signup.html
Real-Time Static Malware Analysis using NepenthesFE
   PEFile
    ◦ http://code.google.com/p/pefile/
   Packerid.py
    ◦ Requires ‘peid’ database (signatures)
    ◦ http://handlers.dshield.org/jclausing/
   UPX
    ◦ http://upx.sourceforge.net/
   ‘file’ : apt-get install file
   ‘strings’
   ‘obj-jump’
   These executeables (chmod +x) should be accessible to
    NFE
    ◦ Place them in /usr/bin/ folder if needed
Analysis Report        Nepenthes             Nepenthes + FE


File name                 Yes           Yes


Unique Identification –   MD5,SHA512    MD5, SHA512, (possibly ssdeep)
Hashes
Malware Name (Family)     No            VirusTotal, Bitdefender (free Linux
                                        AV scanners)
Binary File Type          No            ‘file’

Malware Origin            IP address    Geo-location data


Screenshots               None          GoogleMaps, AfterGlow graphs,
                                        Robtex graphs
Is it packed? Which       No            packerid.py, UPX
Packer?
Statistics                No            Yes (hit counts,RRD graphs)
   Analyzing malware sample‘b.aaa’
Real-Time Static Malware Analysis using NepenthesFE
Real-Time Static Malware Analysis using NepenthesFE
Real-Time Static Malware Analysis using NepenthesFE
Real-Time Static Malware Analysis using NepenthesFE
Real-Time Static Malware Analysis using NepenthesFE
   Works only with Nepenthes honeypot 

   No search functionality

   VirusTotal functionality is broken (new API
    released by VT recently)

   Report cannot be exported
   Open-source
    ◦ Requires volunteers
    ◦ Current version – 0.04 (Releasing v0.05 today)
   Complete documentation available at:
    ◦ http://www.niiconsulting.com/nepenthesfe/
   Implementation of a central NepenthesFE for
    multiple Nepenthes sensors
    ◦ As part of the Indian Honeynet Project (IHP)
      http://honeynet.org.in/
   Submit the malware to a sandbox environment to
    retrieve more in-depth analysis
Real-Time Static Malware Analysis using NepenthesFE
wasimhalani@gmail.com
 har.duro@gmail.com

More Related Content

PPT
Backtrack os 5
Ayush Goyal
 
PPTX
Malware Analysis 101 - N00b to Ninja in 60 Minutes at CactusCon on April 4, 2014
grecsl
 
PDF
Di shen pacsec_final
PacSecJP
 
PPT
Malware Analysis Made Simple
Paul Melson
 
PDF
Suricata
tex_morgan
 
PPTX
Introduction to Dynamic Malware Analysis ...Or am I "Cuckoo for Malware?"
Lane Huff
 
PDF
Automated Malware Analysis and Cyber Security Intelligence
Jason Choi
 
PPTX
Malware Analysis 101 - N00b to Ninja in 60 Minutes at BSidesLV on August 5, ...
grecsl
 
Backtrack os 5
Ayush Goyal
 
Malware Analysis 101 - N00b to Ninja in 60 Minutes at CactusCon on April 4, 2014
grecsl
 
Di shen pacsec_final
PacSecJP
 
Malware Analysis Made Simple
Paul Melson
 
Suricata
tex_morgan
 
Introduction to Dynamic Malware Analysis ...Or am I "Cuckoo for Malware?"
Lane Huff
 
Automated Malware Analysis and Cyber Security Intelligence
Jason Choi
 
Malware Analysis 101 - N00b to Ninja in 60 Minutes at BSidesLV on August 5, ...
grecsl
 

What's hot (20)

PPTX
Malware Analysis 101: N00b to Ninja in 60 Minutes at BSidesDC on October 19, ...
grecsl
 
PDF
[CLASS 2014] Palestra Técnica - Jonathan Knudsen
TI Safe
 
PDF
Introduction to Snort Rule Writing
Cisco DevNet
 
PDF
Web Application Security Testing: Kali Linux Is the Way to Go
Gene Gotimer
 
PPTX
Malware Analysis 101 - N00b to Ninja in 60 Minutes at Notacon on April 12, 2014
grecsl
 
PDF
Shusei tomonaga pac_sec_20171026
PacSecJP
 
PDF
Tick group @avar2019 20191111 cha minseok_publish
Minseok(Jacky) Cha
 
PPT
Linux Virus
Akhil Kadangode
 
PDF
Embedded linux 악성코드 동향 20150323 v1.0 공개판
Minseok(Jacky) Cha
 
PPTX
Malware analysis
Prakashchand Suthar
 
PDF
Hack Attack! An Introduction to Penetration Testing
Steve Phillips
 
PPTX
Basic Malware Analysis
Albert Hui
 
PDF
Suricata: A Decade Under the Influence (of packet sniffing)
Jason Williams
 
PPTX
Bsides detroit 2013 honeypots
Tazdrumm3r
 
PPTX
Bsides chicago 2013 honeypots
Tazdrumm3r
 
PPTX
Rooted2020 roapt evil-mass_storage_-_tu-ya_aqui_-_david_reguera_-_abel_valero
RootedCON
 
ODP
Malware analysis - What to learn from your invaders
Tazdrumm3r
 
PPTX
My Bro The ELK
Tripwire
 
PPTX
Hunting for APT in network logs workshop presentation
OlehLevytskyi1
 
PDF
BlueHat v18 || Linear time shellcode detection using state machines and opera...
BlueHat Security Conference
 
Malware Analysis 101: N00b to Ninja in 60 Minutes at BSidesDC on October 19, ...
grecsl
 
[CLASS 2014] Palestra Técnica - Jonathan Knudsen
TI Safe
 
Introduction to Snort Rule Writing
Cisco DevNet
 
Web Application Security Testing: Kali Linux Is the Way to Go
Gene Gotimer
 
Malware Analysis 101 - N00b to Ninja in 60 Minutes at Notacon on April 12, 2014
grecsl
 
Shusei tomonaga pac_sec_20171026
PacSecJP
 
Tick group @avar2019 20191111 cha minseok_publish
Minseok(Jacky) Cha
 
Linux Virus
Akhil Kadangode
 
Embedded linux 악성코드 동향 20150323 v1.0 공개판
Minseok(Jacky) Cha
 
Malware analysis
Prakashchand Suthar
 
Hack Attack! An Introduction to Penetration Testing
Steve Phillips
 
Basic Malware Analysis
Albert Hui
 
Suricata: A Decade Under the Influence (of packet sniffing)
Jason Williams
 
Bsides detroit 2013 honeypots
Tazdrumm3r
 
Bsides chicago 2013 honeypots
Tazdrumm3r
 
Rooted2020 roapt evil-mass_storage_-_tu-ya_aqui_-_david_reguera_-_abel_valero
RootedCON
 
Malware analysis - What to learn from your invaders
Tazdrumm3r
 
My Bro The ELK
Tripwire
 
Hunting for APT in network logs workshop presentation
OlehLevytskyi1
 
BlueHat v18 || Linear time shellcode detection using state machines and opera...
BlueHat Security Conference
 
Ad

Similar to Real-Time Static Malware Analysis using NepenthesFE (20)

PDF
Zen and the art of collecting and analyzing malware
Gaetano Zappulla
 
PDF
Malware Analysis -an overview by PP Singh
n|u - The Open Security Community
 
PDF
'Malware Analysis' by PP Singh
Bipin Upadhyay
 
PPTX
revisedhoneypot429
Alan Wennersten
 
PDF
Modern malware and threats
Martin Holovský
 
PDF
H@dfex 2015 malware analysis
Charles Lim
 
PDF
Modern Malware and Threats
MarketingArrowECS_CZ
 
PDF
BSidesCharleston2014 - Ballin on a Budget: Tracking Chinese Malware Campaigns...
Andrew Morris
 
PPT
Security & ethical hacking
Amanpreet Singh
 
PDF
Project in malware analysis:C2C
Fabrizio Farinacci
 
PDF
Computer security
Mohamed Abdo
 
PDF
[CONFidence 2016] Leszek Miś - Honey(pot) flavored hunt for cyber enemy
PROIDEA
 
PDF
Honeypots: Visão Geral
bernardo_mr
 
PPT
Security & ethical hacking p2
ratnalajaggu
 
PDF
RenasCON 2023: Learning from honeypots
APNIC
 
PDF
Ethical hacking with Python tools
Jose Manuel Ortega Candel
 
PPTX
DC612 Day - Hands on Penetration Testing 101
dc612
 
PDF
Malware collection and analysis
Chong-Kuan Chen
 
DOCX
Malware analysis and forensic analysis of images
Kyle Taylor
 
PPTX
Exploring Kali Linux Tools for Website Scanning via IP Address
Boston Institute of Analytics
 
Zen and the art of collecting and analyzing malware
Gaetano Zappulla
 
Malware Analysis -an overview by PP Singh
n|u - The Open Security Community
 
'Malware Analysis' by PP Singh
Bipin Upadhyay
 
revisedhoneypot429
Alan Wennersten
 
Modern malware and threats
Martin Holovský
 
H@dfex 2015 malware analysis
Charles Lim
 
Modern Malware and Threats
MarketingArrowECS_CZ
 
BSidesCharleston2014 - Ballin on a Budget: Tracking Chinese Malware Campaigns...
Andrew Morris
 
Security & ethical hacking
Amanpreet Singh
 
Project in malware analysis:C2C
Fabrizio Farinacci
 
Computer security
Mohamed Abdo
 
[CONFidence 2016] Leszek Miś - Honey(pot) flavored hunt for cyber enemy
PROIDEA
 
Honeypots: Visão Geral
bernardo_mr
 
Security & ethical hacking p2
ratnalajaggu
 
RenasCON 2023: Learning from honeypots
APNIC
 
Ethical hacking with Python tools
Jose Manuel Ortega Candel
 
DC612 Day - Hands on Penetration Testing 101
dc612
 
Malware collection and analysis
Chong-Kuan Chen
 
Malware analysis and forensic analysis of images
Kyle Taylor
 
Exploring Kali Linux Tools for Website Scanning via IP Address
Boston Institute of Analytics
 
Ad

Recently uploaded (20)

PDF
How Open Source Changed My Career by abdelrahman ismail
a0m0rajab1
 
PDF
CIFDAQ's Market Wrap : Bears Back in Control?
CIFDAQ
 
PDF
Security features in Dell, HP, and Lenovo PC systems: A research-based compar...
Principled Technologies
 
PDF
The Evolution of KM Roles (Presented at Knowledge Summit Dublin 2025)
Enterprise Knowledge
 
PDF
Advances in Ultra High Voltage (UHV) Transmission and Distribution Systems.pdf
Nabajyoti Banik
 
PDF
Economic Impact of Data Centres to the Malaysian Economy
flintglobalapac
 
PDF
Event Presentation Google Cloud Next Extended 2025
minhtrietgect
 
PPTX
AI in Daily Life: How Artificial Intelligence Helps Us Every Day
vanshrpatil7
 
PDF
Tea4chat - another LLM Project by Kerem Atam
a0m0rajab1
 
PPTX
Dev Dives: Automate, test, and deploy in one place—with Unified Developer Exp...
AndreeaTom
 
PDF
Presentation about Hardware and Software in Computer
snehamodhawadiya
 
PDF
Data_Analytics_vs_Data_Science_vs_BI_by_CA_Suvidha_Chaplot.pdf
CA Suvidha Chaplot
 
PPTX
IT Runs Better with ThousandEyes AI-driven Assurance
ThousandEyes
 
PDF
Cloud-Migration-Best-Practices-A-Practical-Guide-to-AWS-Azure-and-Google-Clou...
Artjoker Software Development Company
 
PPTX
AI and Robotics for Human Well-being.pptx
JAYMIN SUTHAR
 
PDF
SparkLabs Primer on Artificial Intelligence 2025
SparkLabs Group
 
PDF
How-Cloud-Computing-Impacts-Businesses-in-2025-and-Beyond.pdf
Artjoker Software Development Company
 
PDF
Trying to figure out MCP by actually building an app from scratch with open s...
Julien SIMON
 
PDF
Get More from Fiori Automation - What’s New, What Works, and What’s Next.pdf
Precisely
 
PDF
AI-Cloud-Business-Management-Platforms-The-Key-to-Efficiency-Growth.pdf
Artjoker Software Development Company
 
How Open Source Changed My Career by abdelrahman ismail
a0m0rajab1
 
CIFDAQ's Market Wrap : Bears Back in Control?
CIFDAQ
 
Security features in Dell, HP, and Lenovo PC systems: A research-based compar...
Principled Technologies
 
The Evolution of KM Roles (Presented at Knowledge Summit Dublin 2025)
Enterprise Knowledge
 
Advances in Ultra High Voltage (UHV) Transmission and Distribution Systems.pdf
Nabajyoti Banik
 
Economic Impact of Data Centres to the Malaysian Economy
flintglobalapac
 
Event Presentation Google Cloud Next Extended 2025
minhtrietgect
 
AI in Daily Life: How Artificial Intelligence Helps Us Every Day
vanshrpatil7
 
Tea4chat - another LLM Project by Kerem Atam
a0m0rajab1
 
Dev Dives: Automate, test, and deploy in one place—with Unified Developer Exp...
AndreeaTom
 
Presentation about Hardware and Software in Computer
snehamodhawadiya
 
Data_Analytics_vs_Data_Science_vs_BI_by_CA_Suvidha_Chaplot.pdf
CA Suvidha Chaplot
 
IT Runs Better with ThousandEyes AI-driven Assurance
ThousandEyes
 
Cloud-Migration-Best-Practices-A-Practical-Guide-to-AWS-Azure-and-Google-Clou...
Artjoker Software Development Company
 
AI and Robotics for Human Well-being.pptx
JAYMIN SUTHAR
 
SparkLabs Primer on Artificial Intelligence 2025
SparkLabs Group
 
How-Cloud-Computing-Impacts-Businesses-in-2025-and-Beyond.pdf
Artjoker Software Development Company
 
Trying to figure out MCP by actually building an app from scratch with open s...
Julien SIMON
 
Get More from Fiori Automation - What’s New, What Works, and What’s Next.pdf
Precisely
 
AI-Cloud-Business-Management-Platforms-The-Key-to-Efficiency-Growth.pdf
Artjoker Software Development Company
 

Real-Time Static Malware Analysis using NepenthesFE

  • 2. Wasim Halani ◦ Security Analyst @ Network Intelligence India (http://www.niiconsulting.com/) ◦ Interests  Exploit development  Malware Analysis  Harsh Patel ◦ Student @ Symbiosis center for Information technology. ◦ Interest  Anything and everything about security
  • 3. A deliberately vulnerable system, placed on the network ◦ Lure attackers towards itself ◦ Capture the malwares sent to the network/system ◦ Help in offline analysis  Types ◦ Low Interaction ◦ High Interaction
  • 4. NepenthesFE is a front end to the low interaction honeypot ‘nepenthes’  Originally developed by Emre Bastuz  Helps in cataloguing malware collected using nepenthes  Has modules which performs operations to automate some aspects of malware analysis
  • 5. Our Nepenthes honeypot provided only minimal data about the captured binaries ◦ File hash (MD5) ◦ Attacker IP ◦ File Name ◦ ...  What next?  Is that all the value a honeypot can provide?
  • 6. Lenny Zeltser ◦ ‘What to include in a Malware Analysis Report?’  http://zeltser.com/reverse-malware/malware-analysis-report.html  Summary of Analysis  Identification  Characteristics  Dependencies  Behavioral & Code Analysis  Screenshots  Recommendations
  • 7. Once we have captured the binary, we’re still left with doing the routine basic stuff ◦ strings, file, virustotal, geo-ip ...  Can’t we automate it!?  Enter ‘NepenthesFE’ ◦ Basic analysis like filetype, hashes, ASCII strings, packer information, geographical information
  • 9. Provide a statistical output of data collected ◦ How many times has ‘a’ malware hit us?  Provide visualization of origin of malware ◦ Which malwares originate from a single country  To determine and focus on the number of new attacks on to the system  Provide a framework to automate initial static analysis ◦ Is it packed? ◦ Any recognizable ASCII strings in the binary
  • 11. Integrate with the Nepenthes honeypot ◦ Integration with multiple sensors possible  Statistical count of malware hits  AfterGlow diagrams ◦ Country of Origin ◦ ASN  Provide details of the attacking IP ◦ GEO IP database ◦ Google maps
  • 12. Can be extended with custom modules for static malware analysis on real time ◦ Packer Information ◦ ‘Strings’  Anti-virus scanning (for known malwares)
  • 13. Based on Sample (malware) ◦ VirusTotal Scanning  API ◦ Bit defender scanning ◦ Unix based commands execution like File, objdump, UPX and string ◦ *nix based custom script execution to find out details like Packer Information, PE information and entropy analyser
  • 14. Based on Instance (Information about the attacker) ◦ GEO IP database ◦ ASN Information  Mapping of ASN to Robtex  Mapping of ASN to Phishtank  Visualization of attack vectors from a ASN number ◦ Visualisation of attack vectors from a IP address
  • 17. Install Nepenthes Honeypot sensor  http://nepenthes.carnivore.it/  Refer to our first report at IHP  http://www.honeynet.org.in/reports/KK_Project1.pdf
  • 18. List of packages are :- ◦ Build essentials ◦ Apache2 ◦ Libapache2-mod-php5 ◦ phppear ◦ Mysql-server-5.1 ◦ Php5-msql ◦ Php5-mhash ◦ Php5-dev ◦ Upx-ucl ◦ File
  • 19. List of packages are :- ◦ geoip-bin ◦ rrdtool (for Graphs) ◦ Librrd2 (for Graphs) ◦ Librrd2-dev (for Graphs) ◦ Python-pefile (for Pefile module) ◦ Python-all (for Pefile module) ◦ Bitdefender-scanner (for bit-defender scanning) ◦ graphviz (for visualization) And Lots of Configuration....
  • 20. Modify the ‘submit-http.conf’ file in /etc/nepenthes
  • 21. Download the freely available database from MaxMind ◦ http://www.maxmind.com/download/geoip/database/GeoLiteCity.dat.gz
  • 22. Get the Google API Key  http://code.google.com/apis/maps/signup.html
  • 24. PEFile ◦ http://code.google.com/p/pefile/  Packerid.py ◦ Requires ‘peid’ database (signatures) ◦ http://handlers.dshield.org/jclausing/  UPX ◦ http://upx.sourceforge.net/  ‘file’ : apt-get install file  ‘strings’  ‘obj-jump’  These executeables (chmod +x) should be accessible to NFE ◦ Place them in /usr/bin/ folder if needed
  • 25. Analysis Report Nepenthes Nepenthes + FE File name Yes Yes Unique Identification – MD5,SHA512 MD5, SHA512, (possibly ssdeep) Hashes Malware Name (Family) No VirusTotal, Bitdefender (free Linux AV scanners) Binary File Type No ‘file’ Malware Origin IP address Geo-location data Screenshots None GoogleMaps, AfterGlow graphs, Robtex graphs Is it packed? Which No packerid.py, UPX Packer? Statistics No Yes (hit counts,RRD graphs)
  • 26. Analyzing malware sample‘b.aaa’
  • 32. Works only with Nepenthes honeypot   No search functionality  VirusTotal functionality is broken (new API released by VT recently)  Report cannot be exported
  • 33. Open-source ◦ Requires volunteers ◦ Current version – 0.04 (Releasing v0.05 today)  Complete documentation available at: ◦ http://www.niiconsulting.com/nepenthesfe/  Implementation of a central NepenthesFE for multiple Nepenthes sensors ◦ As part of the Indian Honeynet Project (IHP)  http://honeynet.org.in/  Submit the malware to a sandbox environment to retrieve more in-depth analysis