Author Topic: Little Malware Gallery  (Read 8819 times)

0 Members and 2 Guests are viewing this topic.

Offline Deque

  • P.I.N.N.
  • Global Moderator
  • Overlord
  • *
  • Posts: 1203
  • Cookies: 518
  • Programmer, Malware Analyst
    • View Profile
Little Malware Gallery
« on: July 12, 2014, 10:23:59 pm »
Hello EZ

I recently updated my PE visualizer tool again and I added local entropy visualization.
This turned out to be pretty interesting. I just generated about 200 pictures and for some interesting ones I compared the malware hashes with their reports.

Here are some interesting ones. Some explanation about the pictures: The left shows the entropy map, which is the information content of certain file locations. The brighter the picture, the higher the entropy (and information content). Very bright areas are usually compressed or encrypted.
The right side shows the file structure, legend attached. Grey areas are sections.

W32.Salty

Salty is an entry-point obscuring (EPO) polymorphic file infector. Here you see an infected file. The encrypted virus body is in the last section (here .gdata, entropy is high, thus a light area for .gdata on the left). Apart from that it overwrites the host file's code with obscuring instructions.



Symantec: http://www.symantec.com/security_response/writeup.jsp?docid=2006-011714-3948-99

VirusTotal Analysis: https://www.virustotal.com/en/file/07ac76fd7886072c06c4d55a1a18b932a56f1a3057f1c6877628812d73b35c96/analysis/


W32.Simile, also known as W32.Etap

Quote
W32.Simile is a very complex virus that uses entry-point obscuring, metamorphism, and polymorphic decryption. It infects files in folders on all fixed and remote drives that are mapped at the time that the virus is executed. The virus contains no destructive payload, but infected files may display messages on certain dates.




Zeus Trojan (one of the many out there)


Quote
Zeus (also known as Zbot, Kneber, PRG, NTOS, Wsnpoem and Gorhax) is a crimeware kit designed to steal banking information and credentials through various means. The Zeus trojan is spread ma all over.inly through drive-by downloads and phishing schemes.


Offline Traitor4000

  • Knight
  • **
  • Posts: 191
  • Cookies: 8
    • View Profile
Re: Little Malware Gallery
« Reply #1 on: July 13, 2014, 08:28:35 pm »
Well shit 75% of that went straight over my head.
The most vulnerable part of an impenetrable system is those who believe it to be so.

Offline Kulverstukas

  • Administrator
  • Zeus
  • *
  • Posts: 6627
  • Cookies: 542
  • Fascist dictator
    • View Profile
    • My blog
Re: Little Malware Gallery
« Reply #2 on: July 13, 2014, 09:36:30 pm »
Call me an idiot, but what am I supposed to see here? looks like pixelated x-ray photographs :P
« Last Edit: July 13, 2014, 09:36:42 pm by Kulverstukas »

Offline Deque

  • P.I.N.N.
  • Global Moderator
  • Overlord
  • *
  • Posts: 1203
  • Cookies: 518
  • Programmer, Malware Analyst
    • View Profile
Re: Little Malware Gallery
« Reply #3 on: July 14, 2014, 07:50:54 am »
Sorry that I didn't explain it throughoughly.

These are two pictures, one left one right. The right side shows the structure of the file, which is determined by my PE parser. General: It has headers and sections. Sections are the grey scaled tones and often start with a dot in their name. Sections may contain resources, debug-information, exported and imported functions, and executable code. The entry point marks the start of execution, it is displayed as one red square.

The left side are kind of xrays. The left displays the entropy, which is how much information is in there. Like, if you had everything filled with one and the same byte (= no information content), you would get a black area. If you had random numbers in that area, it would be white, because repetition is unlikely. That also means, encrypted and compressed content is very bright.

An example is in the first picture, which displays an infected host file. The virus hides itself by encrypting its body and copying itself into the last section of the file. The last section there is .gdata (see legend to find it).
You can also see that the overlay (= appended data) and the .data section have almost no information content as the area is black. The .text section contains the executable code, you also see the red squared entry point there. Code has a high entropy, but not as much as encrypted or compressed data.

I hope this cleared some things up?

Edit: The Zeus Trojan must be heavily encrypted.
Only protected files look this bright on the entropy picture. This would be a normal (without protection) one:



And another harmless, unprotected file:

« Last Edit: July 14, 2014, 08:38:25 am by Deque »

Offline frog

  • Knight
  • **
  • Posts: 232
  • Cookies: 16
    • View Profile
Re: Little Malware Gallery
« Reply #4 on: July 14, 2014, 08:27:27 am »
Well that's the first time I've ever been able to see a visual structure of different types of malware. It is also neat to see the different parts of the executable and where they reside. Theoretically, there should be notable differences in the structure from program to program.
« Last Edit: July 14, 2014, 08:28:28 am by frog »

Offline Deque

  • P.I.N.N.
  • Global Moderator
  • Overlord
  • *
  • Posts: 1203
  • Cookies: 518
  • Programmer, Malware Analyst
    • View Profile
Re: Little Malware Gallery
« Reply #5 on: July 14, 2014, 08:40:01 am »
Yes, every file looks very different. Except the ones that have been packed with the same crypter.
I like the viszalization to get a quick overview about the file.

Offline Kulverstukas

  • Administrator
  • Zeus
  • *
  • Posts: 6627
  • Cookies: 542
  • Fascist dictator
    • View Profile
    • My blog
Re: Little Malware Gallery
« Reply #6 on: July 14, 2014, 11:51:20 am »
Thanks Deque, your explanation cleared the cloud of confusion and the winds of uncertainty have settled.

Offline $Clone

  • Peasant
  • *
  • Posts: 86
  • Cookies: 5
  • $---Shadowalker---$
    • View Profile
Re: Little Malware Gallery
« Reply #7 on: July 21, 2014, 05:41:12 am »
She always impresses even though am reading this thread 3 times just to understand how images and malware relate.Cool though! ;D btwn... what language is your PE visualizer tool coded in?
« Last Edit: July 21, 2014, 05:43:36 am by $Clone »

Offline Deque

  • P.I.N.N.
  • Global Moderator
  • Overlord
  • *
  • Posts: 1203
  • Cookies: 518
  • Programmer, Malware Analyst
    • View Profile
Re: Little Malware Gallery
« Reply #8 on: July 22, 2014, 04:47:33 pm »
She always impresses even though am reading this thread 3 times just to understand how images and malware relate.Cool though! ;D btwn... what language is your PE visualizer tool coded in?

It is part of my PE library which is written in Java and Scala.

See here for code: https://github.com/katjahahn/PortEx
« Last Edit: July 22, 2014, 04:48:05 pm by Deque »

Offline raTRon

  • NULL
  • Posts: 2
  • Cookies: -3
    • View Profile
    • raTRon
Re: Little Malware Gallery
« Reply #9 on: July 23, 2014, 08:17:45 pm »
Wow, this forum is next-level! I've never seen anything a PE visualizer tool like this before..

Offline $Clone

  • Peasant
  • *
  • Posts: 86
  • Cookies: 5
  • $---Shadowalker---$
    • View Profile
Re: Little Malware Gallery
« Reply #10 on: July 24, 2014, 10:08:26 pm »
It is part of my PE library which is written in Java and Scala.

See here for code: https://github.com/katjahahn/PortEx
thanks ....for the link. 

Offline Traitor4000

  • Knight
  • **
  • Posts: 191
  • Cookies: 8
    • View Profile
Re: Little Malware Gallery
« Reply #11 on: July 29, 2014, 11:21:05 pm »
Sorry for posting on a semi old thread but thank you so much for the explanation Deque helped sooooo much, cool program by the way! +1
The most vulnerable part of an impenetrable system is those who believe it to be so.