YoVDO

Bypassing Malware Analysis Sandboxes Is Easy - Let’s Discuss How They Are Doing It and Why It Works

Offered By: Security BSides San Francisco via YouTube

Tags

Security BSides Courses Cybersecurity Courses Malware Analysis Courses Incident Response Courses

Course Description

Overview

Explore the intricacies of bypassing malware analysis sandboxes in this 39-minute conference talk from BSidesSF 2017. Delve into various automated cloud malware analysis sandboxes, including VxStream/Reverse.It, Malwr, and Cuckoo, as well as high-end commercial solutions. Examine the effectiveness of these tools in analyzing different file formats, such as .DOC and .PDF, and compare their performance against manual analysis techniques. Gain insights into the gaps in sandbox analysis, their reliability for incident response, and their ability to provide sufficient data for network defense and infection remediation. Learn about various evasion techniques employed by malware, including password-protected files, time-based triggers, and parentless processes. Evaluate the efficiency and limitations of email gateways, web proxies, and other security solutions in detecting and analyzing malware.

Syllabus

Introduction
Who am I
What is a sandbox
Passwordprotected files
Olay objects
URL in document
Time
Reverse Audit
Log Analysis
Network Traffic
Persistence
Fax
Strings
Office Mail Scanner
Email Gateway
WordBox
Blank Screens
Web Proxy
Who else got infected
Breaking automated analysis
Parentless processes
Manual vs Cloud
XMNBM
Ransomware
Additional reports
Efficiency
Questions
Summary


Taught by

Security BSides San Francisco

Related Courses

Information Security Management in a Nutshell
SAP Learning
Identifying, Monitoring, and Analyzing Risk and Incident Response and Recovery
(ISC)² via Coursera
Enterprise Security Fundamentals
Microsoft via edX
Planning a Security Incident Response
Microsoft via edX
Introduction to Cybersecurity
Udacity