Malware config extraction at scale - building malware analysis pipelines
Abstract
Over many years of malware analysis projects at CERT.PL, we have gradually improved our approach to automating the extraction of configuration from malware samples. The workshop will provide a practical hands-on introduction on how to setup a minimal malware repository with automatic config extractors. We'll take a look at malduck – the backbone of configuration extraction. It's a Python module that contains commonly used analysis helpers like:
* config extraction engine
* cryptographic functions, fixed integer types, compression algorithms
* operations on memory dumps and PE/ELF files
We'll use it to create a small config extraction module. The module will be then integrated into MWDB – an open-source malware repository, that allows us to ingest feeds, search and enrich samples, and share data with other users. The integrated extraction module will allow us to automatically extract configurations from uploaded malware samples which we will test out by uploading a batch of various samples.
Speaker
Michał Praszmo
Requirements
- A laptop (linux based operating systems are preferred)
Advance Preparation
- Docker Compose and Python virtual environment
Skills
- An intermediate grasp on reverse engineering and Python programming would be required.