Tuesday, October 14, 2014

DDoS & Security Reports » MindshaRE: Statically Extracting Malware C2s Using Capstone Engine

It’s been far too long since the last MindshaRE post, so I decided to share a technique I’ve been playing around with to pull C2 and other configuration information out of malware that does not store all of its configuration information in a set structure or in the resource section (for a nice set of publicly available decoders check out KevTheHermit’s RATDecoders repository on GitHub). Being able to statically extract this information becomes important in the event that the malware does not run properly in your sandbox, the C2s are down or you don’t have the time / sandbox bandwidth to manually run and extract the information from network indicators.



DDoS & Security Reports » MindshaRE: Statically Extracting Malware C2s Using Capstone Engine

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.