Upgrade to Pro
— share decks privately, control downloads, hide ads and more …
Speaker Deck
Features
Speaker Deck
PRO
Sign in
Sign up for free
Search
Search
tech_scareware_presentation.pdf
Search
hexadecim8
September 10, 2018
0
250
tech_scareware_presentation.pdf
hexadecim8
September 10, 2018
Tweet
Share
Featured
See All Featured
Why You Should Never Use an ORM
jnunemaker
PRO
61
9.7k
JavaScript: Past, Present, and Future - NDC Porto 2020
reverentgeek
52
5.8k
Side Projects
sachag
455
43k
Information Architects: The Missing Link in Design Systems
soysaucechin
0
770
Digital Ethics as a Driver of Design Innovation
axbom
PRO
1
180
Dealing with People You Can't Stand - Big Design 2015
cassininazir
367
27k
Organizational Design Perspectives: An Ontology of Organizational Design Elements
kimpetersen
PRO
1
190
brightonSEO & MeasureFest 2025 - Christian Goodrich - Winning strategies for Black Friday CRO & PPC
cargoodrich
3
99
A Modern Web Designer's Workflow
chriscoyier
698
190k
Rails Girls Zürich Keynote
gr2m
96
14k
Building Better People: How to give real-time feedback that sticks.
wjessup
370
20k
Documentation Writing (for coders)
carmenintech
77
5.2k
Transcript
ANATOMY OF A MASSIVE MALWARE DISTRIBUTION CAMPAIGN A brief taxonomy
of SLOR Tools, Techniques & Procedures
INTRODUCTION Emily Crose Network Threat Hunter Ironnet Cybersecurity Twitter: @hexadecim8
SLOR …But also a malware distribution campaign
IT STARTS WITH A THREAD…
THE FOUR W’S What the fuck is this shit? Where
the fuck is this shit coming from? Who the fuck is doing this shit? Why the fuck is it doing this shit?
WARNING There will be swears in this presentation
Network active ping port scan URL Fuzzing Banner Grabbing passive
whois Centralops.net Domain tools Reputation checks virustotal registration pivoting RiskIQ PassiveDNS File Forensics file reputation file hash Sandbox analysis Hybrid-analysis
None
None
WHO TF IS DOING THIS? Cloudflare Range
None
None
EW . NO. W HAT THE F IS THIS??
None
HYBRID ANALYSIS
Links
None
None
None
None
None
What The Is This SHIT?!
• Auto-generated domains • A TON more domains with similar
looking documents to the original we found • The domains look like they’re being created and cached every day. • Same registration service • All whoisguarded • Documents which apparently aren’t malicious
THIS DOC HAS TO BE MALICIOUS RIGHT!?!
My research IP address
None
None
WAT DO?
FAST FLUX CAMPAIGN • Domains change rapidly • Malware is
delivered, delivery endpoints dissolve into the aether • Fairly good OPSEC to this campaign
CAMPAIGN EVOLUTION DGA Reasonable-ish 2nd level domain DGA evasion
None
ANYTHING IN THE C2??
EXTRA_TARGET_0.BAT
WHAT CAN WE DO? • Domain blocking? • It’ll all
be gone tomorrow • IP blocking • They change too frequently • Application whitelisting? • Sure, but what if it something changes again?
LESSONS LEARNED • ABC – Always Be Curious • Trust
your instincts • Be a good citizen • You may not always get the answers that you’re looking for, and that’s okay
MORAL OF THE STORY • “You can’t always get what
you want.” -Mick Jagger
CONTACT INFO • Emily Crose • Ironnet Cybersecurity • Twitter:
@Hexadecim8 • Email:
[email protected]