Automated Extraction of Configuration and Payloads from Sophisticated Malware
Offered By: 44CON Information Security Conference via YouTube
Course Description
Overview
Explore an innovative solution for automated malware analysis in this 42-minute conference talk from the 44CON Information Security Conference. Delve into the challenges of reverse engineering sophisticated malware samples and discover CAPE (Automated Extraction of Configuration and Payloads), an open-source platform designed to streamline the process. Learn how CAPE combines various techniques and tools to extract payloads, configurations, and indicators from complex malware families, particularly those associated with nation-state actors. Gain insights into the system's capabilities, its potential to revolutionize threat intelligence, and how it can be expanded to combat increasingly sophisticated malware. Understand the technical aspects of malware obfuscation, manual analysis approaches, and automated techniques employed by CAPE. Witness a walkthrough demonstration of the platform and explore its extensibility features, including how to create custom packages and utilize the CAPE API for config parsing.
Syllabus
Intro
A bit of background..
Malware Obfuscation
Manual Approach
Automated Analysis
Techniques & tools from manual analysis
Debugger
Dumper
Import Reconstruction
CAPE Walkthrough Demo Plug
DLL Side loading
Extracting/loading modules in memory
Process injection: Shellcode or DLL
Process Hollowing (RunPE)
Executable Packers/Custom Crypto
Current Coverage
CAPE Extensibility
How do you make a package? CAPE API
Config Parsing
CAPE Resources
Taught by
44CON Information Security Conference
Related Courses
Malicious Software and its Underground Economy: Two Sides to Every StoryUniversity of London International Programmes via Coursera Palo Alto Networks Cybersecurity Essentials II
Palo Alto Networks via Coursera Introducción al Análisis del Malware en Windows
National Technological University – Buenos Aires Regional Faculty via Miríadax Android Malware Analysis - From Zero to Hero
Udemy How to Create and Embed Malware (2-in-1 Course)
Udemy