Slide 29
Slide 29 text
Comparison
Type I Type II Type III
features in common basic functions (e.g., UAC pop-up bypassing, C2SettingURL decoding),
protocols (e.g., characteristic HTTP headers, date dword encryption
key), C2 command numbers (e.g., disk/registry operations)
executable loading
PlugX
signed exe signed exe rundll32
encrypted data table Yes Yes
(no “GULP”)
No
protocols TCP,HTTP,UDP TCP,HTTP,UDP,
ICMP,DNS?
TCP,HTTP
Debug Strings
(Version Path)
sometimes rarely not at all
string obfuscation No Yes Yes
(much more)
code obfuscation No No Yes
date dword
encryption key
20120123, 20121016,
20121107,
20130810 20100921, 20111011