layout
permalink
title
default
/RE101/section2.1/
Malware Techniques
Go Back to Reverse Engineering Malware 101
Section 2.1: Malware Techniques
The malware classes may exhibit one or more of the following techniques. Mitre Att&ck framework provides a great reference for many of these techniques.
Combining the compressed data with decompression code into a single executable
Runtime packers
Self extractive archives
List of packers
Goto Top^
Deliberate act of creating obfuscated code that is difficult for humans to understand
Plain text strings will appear as base64 or Xor
Malicious behavior will include junk functions or routines that do nothing to throw off the reverser.
Control-Flow Flattening
String Encryption
Name
Hash
Link
EXTRAC32.EXE
f4d9660502220c22e367e084c7f5647c21ad4821d8c41ce68e1ac89975175051
virustotal
Goto Top^
Once malware gains access to a system, it often looks to be there for a long time.
If the persistence mechanism is unique enough, it can even serve as a great way to identify a given piece of malware.
Example: Dll Search Order Hijacking
Name
Hash
Link
Banker Trojan
cb07ec66c37f43512f140cd470912281f12d1bc9297e59c96134063f963d07ff
virustotal
Goto Top^
Exploiting a bug, design flaw or configuration oversight in an operating system or software application to gain elevated access to resources that are normally protected from an application or user.
Common Techniques:
Dll Search Order Hijacking
Dll injection
Exploiting a vulnerability
BufferOverflow
StackOverflow
Headspray
Return Orientated Programming (ROP)
Credential Theft
UAC Bypasses
Goto Top^
Evading detection or avoiding defenses.
Common Techniques:
Killing AV
Deleting itself after a run
Timebombs/Timestomping
Stolen Certificates
Dll Side Loading
Masquerading
Process Hallowing
Code Injection
Name
Hash
Link
darkcomet backdoor
1be0ca062facda59239cc5621d0a3807a84ed7d39377041489b09d3870958fee
virustotal
Goto Top^
Going after password storage
Keylogging passwords
Screenshots
Example: Mimikatz
Credential theft
Name
Hash
Link
mimikatz
b4d7bfcfb8f85c4d2fb8cb33c1d6380e5b7501e492edf3787adee42e29e0bb25
virustotal
Goto Top^
Gain knowledge about the system and internal network.
Goto Top^
Enable an adversary to access and control remote systems on a network and could
Name
Hash
Link
winmail.dat^QGIS-KOMIT .zip^QGIS-KOMIT .exe
c0f38384dd6c1536a0e19100b8d82759e240d58ed6ba50b433e892e02e819ebb
virustotal
Goto Top^
Techniques that result in execution of adversary-controlled code on a local or remote system
scripts
post-exploitation
Goto Top^
Identify and gather information, such as sensitive files, from a target network prior to exfiltration
Name
Hash
Link
keylogger
5d5c01d72216410767d089a3aabddf7fdbe3b88aff3b51b6d32280c3439038fa
virustotal
Goto Top^
Removing files and information
Goto Top^
Communicate with systems under their control
Name
Hash
Link
backdoor
02fc2d262cb0d5e9d3e8202ea69013c5c8cc197685c73c0689cbeb243d508e76
virustotal
Goto Top^
Malware Classes <- Back | Next -> Section 3