YoVDO

Offensive Malware Analysis - Dissecting OSX/FruitFly via a Custom C&C Server

Offered By: Black Hat via YouTube

Tags

Black Hat Courses Cybersecurity Courses Malware Analysis Courses Network Monitoring Courses

Course Description

Overview

Explore the intricacies of offensive malware analysis in this 24-minute Black Hat conference talk. Dive into the process of dissecting OSX/FruitFly malware through the creation of a custom command and control (C&C) server. Learn how this approach can expedite analysis for malware analysts and potentially allow for hijacking infected hosts. Discover the benefits and techniques of creating a custom C&C server for someone else's malware. Examine the FruitFly variant B, including triaging the script, decoding subroutines, and understanding the main processing loop. Gain insights into network, file, and process monitoring, as well as mouse and keyboard sniffing. Follow the step-by-step process of building a custom C server, handling malware connections, tasking, and command responses. Investigate primary C servers, victim identification, and communication protocols. Conclude with practical advice on protecting yourself from such threats.

Syllabus

Introduction
Overview
Goal
FruitFly
Variant B
Triaging the Script
Subroutines
Decoding
Main Processing Loop
Basic Protocol
What to Monitor
Network Monitoring
File Monitoring
Process Monitoring
Mouse and Keyboard sniffer
Building our custom C server
What does malware do when it connects
Tasking and handling command responses
Command 2 triage
Communication is key
Fully compatible
Primary C servers
Victim identification
Wrapping up
How can you protect yourself


Taught by

Black Hat

Related Courses

Computer Security
Stanford University via Coursera
Cryptography II
Stanford University via Coursera
Malicious Software and its Underground Economy: Two Sides to Every Story
University of London International Programmes via Coursera
Building an Information Risk Management Toolkit
University of Washington via Coursera
Introduction to Cybersecurity
National Cybersecurity Institute at Excelsior College via Canvas Network