Transcript
This transcript was autogenerated. To make changes, submit a PR.
Hello everyone. Welcome this session and today we're going to talk about these malware hunting
using Python as an attack weapon, right?
So this is my contact at Twitter, at Philippiers
and my contact on social media. If you like, send me a message.
This is my homepage, philippirs.com and my GitHub by the
way. So I have some project there and my link is in and
if you'd like to change some message with me. So I really
appreciate that. Okay. And by the way, in my Twitter usually
I like to share some tools, open source tools, by the way,
about some focus on cybersecurity and
program languages and different products. And by the way about the security
stuffs, right? So let me introduce myself. I'm secure to research at
Sapporo is a company from Switzerland and
this company is responsible to provide a visibility of
the attack surface in different
cloud environments. And not only cloud environments, but on premise
as well. And Box and Microsoft and Azure, Google Cloud
and by the way in Azure
as well. And the idea behind of this product is to look in
more about these isograph vision and
how the attacker can explore different organization.
So I'm security advocates for Onsen Segura San Segura is
a global company responsible to provide some pen
solution pen. It's acronym of the privileged access management,
right. And I'm advocate from hack is not a crime.
It's an awesome project. By the way, it started in us.
The idea behind of this project is to talk more about this concept called
hacking, right? Because when you read some information
on the newspaper or on tv, usually this term
is related to about cybercriminal.
But it's wrong. The idea behind these talk about the hacking,
it's about how you can use in your creative mind when
you're looking for some software and how you can improve this specifically
software, and how you can help the companies of
course, into looking or a security perspective. But when
you look about the exposure of the information, it's not a
hacking, it's about these threat actors, it's about these Cybercriminal.
Okay, so we can find more information in my web page,
in web page from this specific project, okay. And I'm
a coordinator of the Defcon group, one of these coordinator of the DEfcoN groups in
Sao Paul. And by the way, I'm talking not from Brazil, but I'm talking from
Portugal. I'm living here, there. And I'm
leaving now, actually. And I'm instructor, writer and heavier,
those three magazines, Fantastic magazine, hack 90 and forensic.
And you can find my course about the Maura attack type with Q
chain in the Pentasy magazine. Okay, so just information about me.
So let's talk about our main topic. I would like to
explain to all of you about what is exactly
a threat because it's very important to put all those people on the same
page, okay? So it's not definition from flip, it's definition from
these specifically ISO, okay. Threat is defined as
a potential cause of the incident.
I mean in something that happened in specifically company
organization or is
a potential cause in these specific incident. Of course they
need to be the users or the
security team maybe needs to investigate more about that, but it's
specifically about the software attacks or about these death of intellectual
property or maybe identity death. It's very important.
And sabotage, it's another kind of threat.
And information, or all those information distortion are
example of information security threats. It's very important to understand those difference,
okay? Because today we are talking
about how you can use in pipe scripts in more attack
perspective. And because of that it's very important to understand
what is exactly a threat and how
is important we improve our code,
our applications, okay? As a
result, many and many organizations chose active
thready hunting practice. I mean they need to look in more
deeply about how the networks exactly
work in the organization and they need to
investigate more about all those aspects inside
of this specifically network, okay? And let me invite
you to think more about me within this specific brainstorming,
right. So today
when we talk about the threads, it's very important because we have many different researches.
And if you are a developer,
if you're working for example in DevOps team, maybe when you
need to apply something, we need to create some infrastructure, for example,
we need to research more about that. And when you talk about the security,
we can work in different ways. We can working with the research of
threads, we can discovery new kind
of attacks or specifically different in
a different views from the attacker perspective, you can
improve your team in a proactive line
of defense against advanced threads. It's acronym of
the Advanced Persistent threads in apts,
in this case, what that means in this case using
offensive techniques, because if you are again a
developer or if you are a programmer or
no matter the specifically name, you can use.
But if you know how this works in web applications
and the mobile, for example applications,
for example, you know how these applications
works. So basically you can found different
possibility to explore this specifically
software. So this is you can use in your offensive techniques, okay?
And you can work with vulnerability research.
It's the same case in the same way you can find some web applications,
you can investigate more how this application works. If you find some
bugs. If these bugs, you can explore inside of this specifically
bug, you can find a specifically vulnerability and
you can work for example with the development of exploits specifically
coded to explore this vulnerability.
And we can work with the reversing engineer.
Sometimes these is more related to not only a mobile
because you can work with a reversal engineer in a specifically
app or EZDK or another APK or other different specifically
binary, but you can work with malware analysis for example using
different methodology like analysis staticy and
statistical analysis and dynamic analysis. And you can use it in a reversion
engineering inside of this specifically methodology to
looking more deeply about how the binary works. I mean
the portable executable like a PE or alpha binary or
PDF or document word or excel
or another different document offset. Okay, we can
work in an intrusion detected. I mean we can work
in security providers and you can discover how
this vulnerability which works. And after that you can create
a specific signature for this specific IDS
intrusion detection system, providing intelligence from these specific
product. Okay. And you can work with a forensic analysis,
it's more related to a post attacks. So when you can
collect this specific evidence, you can investigate more deeply
about that. So we have many possibilities to working in our cyber
cybersecurity evangelist way. Again, if you are a developer, you have a
good advantage because you know how the applications
works, you know how the mobile applications, web applications and
whatever application works. This is the good advantages.
Okay, so first of all, we have a thread and after
that, usually when you investigate something about that,
no, you can, but you see if it's non
thread like for example patcha
or remsor or kind of ransomware.
It's for example when a cry or patcha
or another is specifically attacks using
specifically malware or it is an unknown threat, it's totally
like a zero day. So the security
providers don't have any signatures to protect itself
specifically against this attack. So basically we
have, it's almost basically, of course it's only
basically two different threads, a no and a no. Okay.
And after that you can create a report if you execute some investigations
about that. So it's very important because when you describe
that you can improve your knowledge about how the threads works.
And of course you can provide this to your coordinator, your tech
lead, your manager, because it's very important to
give this specific vision for your organizations.
And after that you can improve your defensive mechanism because when
you see how is exactly the path using by the attack, you can
see what is exactly the technology based
from the attacker or by the attacker. You can see exactly these is
exactly the path. So this is the creative mind. So you investigate
how these attack works in your environment, or you can think
more about how is the new possibilities you
can using to explore this specific environment. That's very nice.
And after that you can create this specifically cyber threat intelligence.
I mean, even if you are a big company or a small company, no worries
about that. Because you can use indifference tool to help you to give this
specifically vision about how the cyber thread
intelligence works. You can use in different frameworks to give this
big visibility. Okay, that's very important. And if you
perform in specific clan arts, you can look in more deeply about that. Okay.
And of course we need to have this specifically strengthening cyber resilience,
because the threads are changing all
the time. Okay, so nice.
So let's talk about the creative or creating a creative
mind. Okay, so that's the point here
and the main topic about our conversation
in these event. So I will explain more about
this pyramid called purpose or the idea behind all that.
Okay, so the purpose of that is in this
test I was to run not only, but more than one
pipe script to perform various efficient detected risks.
And the idea is to bypass specifically security solutions
in my environment, when I worked in these specifically organization.
But you can use in this, in your environment now, no worries. And this is
my suggestion. During our demonstrations, we all
will show a defensive security analysis with these offensive perspective.
That's the point here. Using two python script or
more than one, you can download many different malwares in this
specific environment to test your security sensors.
Okay, so that's the idea. The first test is to simulate target
attacks. The idea behind of this test is to download different
malwares and to understand what is exactly these behavior
from the security vendors. Of course about the signatures,
about the next generation antivirus, and about machine learning,
because usually these security sensor have a different technology
to protect it, to protect these organization. So the idea is
to simulate a real malwares to download in this specific environment.
These is the first purpose. And the second purpose is to download more than
one. I mean my idea these is to download
the daily batches of these malwares. It means
in the end of the days we have a specific malware bazaar repository. I will
explain more about our conversation today. We can download more
than one malware, is a simulation specifically how to break
infections in your environment. So that's the idea. And this second
task, because my thinking about
that is how should be the behavior of
the using provided for this protection organization.
So if I infected with these kind of outbreak
infection in my environment, so what should be
the behavior of the using. So that's the aging and by the way,
not here, sorry. But here is the website, Maurer Bazaar.
It's a bazaar a boost.
You can find these, you can put in for example Mauer
Bazaar. It's pretty simple, you can click here. This is the
idea, okay, Mawer is a project from abboost CH
with the goal is sharing malware sample with
the infosec security. So here you
can see more than one specifically malwares,
okay, it's many different malwares, different using tag signatures.
For example, you can see an excel file,
doc file. For example dlls is a quotable
from Microsoft out from Linux. For example you
can looking from, for example, you have here how you can
search for a tag. For example you can put in here, for example tag and
PDF, click enter. You can see more than one PDF
and different malware as you can see here. And you can do
some testing, for example you can use in here my pdf. By the way,
I download this in 2020. This is specifically
malware PDF. I have some talks that I explain more about this
specifically malware. But here is the main top. We have here
the API. And if you see here different API queries
or different queries to using. And you can use in here the example
of the Python three example of the Python script.
I using those specifically from this
specifically repository here is the guy responsible
to create that, okay, Corsin Camichelle, I don't know if
I'm pronounced correct, but it's a very nice guy. And he creates
specifically those tool
that I am using here in these demonstration, I explain more about this specifically,
okay, nice. Let me return here.
And this is the first python code, okay,
so the idea about this code, as you can
see here, this is I import different requests
and systems and argument. It's pretty simple Python
script to execute this. Basically I will download
one specifically malware or real malware inside of malware environment.
And as you can see, I need to set the s to select
the hash of the malware. So basically I need to
see here, I need to find it, for example here in Bomber bazaar,
this is for example, let's check, let me show you here.
This is the hash, okay, the identity from this specifically malware.
So basically in this code I need to set s and
after that I need to set this specifically hash.
And after that I need to set another argument like a u to
unzip this file. Why? Because usually when you talk about these specifically
malware repositories, usually when
you download some malware, as you can see, I will click here just to show
you download. Take a look. This is specifically explanation.
So usually the malware when you download is a zippet
like this. And usually they're using the same password and fact that.
So that's the idea not only in malware bazaar, but you can find in
another like for example Philip 86 this is my GitHub.
You can find in this specific repository here repository
and you can click here in repository and after that
you can click here in these zoo. Basically this
is another repository you can find here, many others mauer
as you can see here malwares, you can click here. It's not my repository,
it's from the community. You can see here these binaries or source and
take a look at many different real malware. So be careful because it's
a real malware. Okay, so different ram servers. So if
you would like to make some tests, you can use in here,
for example in the zoo or you can use in here the malware bazaar.
Okay, so let me return here. So remember, first of all I need
to execute in the pyri scripts and after that s
to set the hash, and after that u to
unzip the file. Okay, so basically this is
the beginning of the file and after that I need to set the
password as you can see here. In fact that I need to set here the
API provided maui bazaar because when you made
your registration in mauibaza, basically you need to have a specifically twitter
account and after that you have this one of this specifically
API. So you need to put in here and after that you can execute
itself the code to download, and after that unzip
the file as you can see here and execute the malware.
And in this case not executing. I just download the
malware in these environment. Why I just download? Because my idea is to see the
behavior of the engines detected by signature.
So I didn't need to execute
itself the malware. Okay, so basically you execute here Python in
Windows platform, as you can see set malwaresbazaar py
here. Maybe it's a small I set here s
because I need to put in here the hash, as you can see a big
hash, I think it's 256
or this is the hash and u because I
need to unpack it or unzip this specifically files.
So as you can see here, it's a wanna cry? Very known ram summer.
Okay. And as you can see here, detected this specifically
script. This is the malware I download
in this environment. And after that, the pyri
scripts unzipped that this is specifically called. Okay,
so after that, the idea is the cyber reason to
block. This is the security solutions, okay? And as you can see
here, the mauer, it was blocked. So good,
nice. Because the solutions it works based on signatures.
I didn't need to click to
execute the malware, because when the script download
the malware in my environment, after that, the engines responsible for signatures
block this specific code. Okay. And as you can see, these log is blocked.
Okay. These second task I detected in Sofall's secure
solution, it's another different solution, the same case.
And now I'm using another hash. As you can see, starting to started
with two, two ed different hash.
It's another different malwares, okay. And as you can see,
these same behavior. So as you can
see, the first downloaded zip it
file. And after that, the code unzipped,
or in this case, unpacket, is specifically sample.
Not sample, is mal in these case. But as you can see, these security
engine block. And these is specifically malware. So very nice.
And the third test executing in this case, in a cloud strike.
So I customize a specifically code here.
It's just for fun.
And I put here another name, by the way, based underscore bazaar
s. As you can see, it's another hash u.
Those three hashes are Mauer.
But in this case, Calder strike didn't detect why.
And that time, when I performed this tests in 2020,
that time, the cloud strike explained me that the
solution just work with a
machine learning, not work with signatures.
I will explain the only way to detect this
specifically malware. This is an explanation from crown strike.
After these user click in these
specifically Mauer. I mean,
the user need to interact with the Mauer, okay. But from my
perspective, these is the opinion from Philippe. It's very important to
have the signatures, because why I need to investigate.
So why I need to verify if
the malware is malicious or not, when I know that this malware is
malware. Okay, makes sense for me. So I don't need to wait
for the curse, the client or the user. Actually,
I don't need to wait the user clicking these specifically binary to
see if it's malicious, because I know based on signatures that it is
malicious. But I heard something
about that, that now in this year, in 2021,
that the solutions will be improved. So I think now
they work with signatures. And the second Python script, remember this
is the first test. So cyber reason and soaps had
a good result, but cloudstrike didn't have
a good result, okay. Because it's these behavior conference.
So these again. But in this case, the second task, remember,
in this second task, I simulate alti breaking factor.
I will explain more about that. As you can see here, I import specifically
libraries these, as you can see here. Okay, Python ziper to
again uncompressed the zip file and the zip
file actually and here, as I mentioned, there's a simple customization
and that time I worked in supernovation. It's a global company,
it's a brazilian company, actually responsible to
provide different consulting developer solutions.
I think it's an explanation here. And as you can
see here, these downloading of this specifically API.
I call this specifically API, as you can see here in the code setting
here, the daily malware badges, as you can see. So remember,
the community is responsible to provide many malwares
per day. In the end of the day, the malware bazaar collect
all those maus and pivoting in a specifically directory
and put in this directory the name of the daily
branches, as you can see here. So basically it's
download these
data specifically of the day as you can see here.
And so the idea behind of this tests is to download all
those malwares during this specifically
date and download it to simulate a specifically infection,
altibrake altbreak infection. So these is the idea
behind of this code. So this is the second code. And again
daily bazaar I call here mauer underscore download.
As you can see using the data specifically in 10 September
in 2020, I downloading, calling specifically
data tests using this specifically URL from API from Maurbazar.
Using the API from our bazaar download is completed.
After that I saving data tests, as you can see here, is completed because I
called this specifically directory from Maurbazar.
And after that, as you can see here, a data set unpacket.
So in this case, I downloaded more than,
if I remember correctly, more than 300 malwares
in this specifically day. Okay. And as you can see
here, so many malwares were detected.
And by the way, all those tests I reported to cyber,
to Sophos and I
reported to crown strike. And basically in these specifically task,
the cyber reason didn't attacks for Maverick,
but I reported that to the cybersecurity solutions. And after that
I had some conversation with them with there and they
improved the solutions. It's very nice conversation with
the cyber. The second task is I performing in Sophos environment.
And as you can see here, in this case I saw a different
behavior because Sophos has more than one binaries
using this solution. Remember, in the beginning of the purpose of these
tests is to simulate an efficient and detection
test. So the idea is to simulate a
behavior from the engines providing detection from
signatures, machine learning and next generation antivirus.
So in some solutions we have all those protections
in these same binary, but in this case in Sophos,
as you can see here, we have more than one services,
or actually not services, but binary inside of the machine,
the user machine. Because of that, when I try to
simulate this specifically tests, we have high,
high cpu as you can see here, and high, high memory
to protect. So that remember when
I had this idea, my idea
is it was understand
what is exactly the behavior of the engines.
So maybe I could broke the engine.
And when I broke this engine, because it's totally
the many infections in the user machine,
I can block the protection. So from
the attacker perspective it's very nice because
I could gain the access in environment because I don't have any antivirus
protections to protect against the threats.
Okay, spoiler alert. Just a few
other code, I don't have idea to explain during this session,
but I would like to show you something very simple like
this. You can find this on the Internet very easy, okay, it's a simple import
some specifically libraries to open a socket here.
Because in this case my idea is to gain
the reverse shell in a specifically victim machine, as you can see
here, I import a specific socket setting here my
web server, and after that I set my port to open a
reverse port to using my local port, okay,
and very simple. And I using here to infect and
specifically vicro machine, as you can see here. So I made these specifically
task in enclosed strike. So first of all I
download the binary here, because of that it's a spoiler, because maybe
I can talk more about that in another event and just
a simple spoiler about that. So I
enable all those security policies here.
And I go to the specifically
I open the netcat to receive this specifically
reverse shell, as you can see here. And after that
I need to download
this specifically file inside
of the victims machine. And I need to execute this files in these
victims machine, okay? And after that I will receive this
specifically reverse these shell. So as you can
see here, this is my machine and this is the
port, actually the attacker port. And here is the attacker
machine. Okay, so let me return here in the vitamin
machine, let me click here and I need to execute here the python
script, that python script that I show you. So I call it shell
Python. Open the service here. As you can see the CMD in
green color, but nothing happened here and nothing
blocked here. But as you can see here, I gained
the reverse shell in the big burn machine. So now I
have the access and this specific environment. So I have
all those access. I'm a local domain
I can use in different things to do, and by the
way, I execute in different comments here and I
explore different things. But it's an expo so I
need to show you this in other events. So if you have any question everyone,
so please let me know. And thank you again for this time
here during the session. I hope this session should be
useful for you. Again, I show you more about
this specifically python code, but I just to
give you this specifically creative mind and
when you work in your organization, so how you can look in
your security sensor using the Python script, because it's
easy to create that and how you can use in python script to improve
your security environment. Okay, so that's my idea
during the session. So again, thank you so much for being here with me and
see you in the next event.