CS代写 SESSION ID: MBS-R02 – cscodehelp代写

SESSION ID: MBS-R02
How to Analyze an Android Bot
Nokia Threat Intelligence Lab @KevMcNamee

Copyright By cscodehelp代写 加微信 cscodehelp

Introduction Tools
The Lab Demo

Why Analyze Android Malware
We monitor mobile traffic for malware infections
Malware C&C Exploits DDOS Hacking
Need accurate detection
Forensic Analysis
MOBILE NETWORK SECURITY ANALYTICS
Alert Aggregation & Analysis
Malware Detection Sensor

Developing Malware Detection Rules
MALWARE SAMPLES
TRAFFIC POLICY
ZERO DAY BEHAVIORAL RULES
VIRUS VAULT • 120K+ ANALYZED
• 30M+ Active samples
MALWARE TRAFFIC LIBRARY
RULES DEVELOPMENT
RULES REPOSITORY
RULES LIBRARY
RULE ACTIVATION
DEPLOYMENT-SPECIFIC RULE SETS
QUALITY TESTING
FEEDBACK FROM FIELD TESTS
FIELD TESTING IN LIVE NETWORKS

Android Malware Analysis
So, we built our own Android malware analysis lab
You will learn
What tools are required
How to set up the network environment How they are used
Analysis allows you to:
Know what the malware does Understand its threat level
Detect and remediate the infection

Android App
Contained in APK file (zip format)
Main components include: Manifest
Dalvik byte code (classes.dex file) Resources

Basic Analysis Process
Explore what’s in APK file
Decompile DEX and review source
Run app on phone or AVD & capture network activity

Tools – Android Studio
If you are going to analyze apps you have to know a bit about how they are made…
Also provides many of the tools needed for analysis…
ADB (debugging)
AVD (simulated phones)

Tools – Apktool
Tool for reverse engineering Android packages (apk files)
Extract components
Manifest, Resources, Libraries, Assets, Byte-code (Smali)
Can edit and modify components
Rebuild modified app

Tools – ADB
Android Debug Bridge
Comes with Android Studio
Shell access
Access to file system Scripted remote control Application Install/Uninstall

Tools – dex2jar
Converts Dalvik byte code to Java byte code
First step in de-compiling an Android app.

Tools – Java Decompiler
Converts Java byte code to source code.
Doesn’t always work
Options include: JD-GUI
Luyten (Procyon)

Tools – WireShark
Capture and network traffic Analyze network traffic
Help develop detection rules

Control Server
Packet Capture

Using a Real Mobile Network
Some malware may only function on a real mobile network You can build your own mobile network.
Linux OpenBSC OsmoSGSN OpenGGSN

Automation
We have automated the analysis process using: Web based user interface
Real phones and AVDs Malware database APKtool/Dex2Jar/GD-GUI ADB scripting
Monkey Script WireShark
Interface to Virus Total

Provides a name

Information from Manifest

Run Sample in AVD

Analyze Network Traffic

Manual Demo – NotCompatible Proxy Bot

Disassemble APK

Directory structure created by apktool
Disassembled Dex in Smali format

View Manifest
Permissions

Unzip APK file
Convert to JAR

View the Java source
Config file is encrypted using AES

C&C Decoder

It can be modified If you don’t like Java and the APK can be you can look at the rebuilt using Smali code. apktool
C&C Decoder

Ping/ Request
C&C packet capture

NotCompatible – Overview
Web Proxy Bot ported from Windows to Android environment.
Allows remote miscreants to anonymously browse the web through the victim’s phone.
Consumes lots of bandwidth, for example 165MB in two hours over 300K TCP sessions

NotCompatible – Infection
Phishing spam is used to lure the victim to an infected web site.
Web site tells you the browser is “not compatible” and provides an update.
The user downloads and installs update.apk
Malware has no icon or user interface. It is automatically started on BOOT.
You can get rid of the infection by uninstalling the application.

NotCompatible – Operation
Opens an encrypted configuration file containing the address and port number of the server.
The bot connects to the server via TCP.
Sophisticated command and control protocol is then used to multiplex Web proxy services over that connection.
This provides an anonymous web browsing services to clients.

NotCompatible – Command & Control
Simple command/response packet format contains both commands and data.
Channel number can multiplex many connection at once.
The ping and pong are used as a heartbeat when there is no proxy work to be done.
Once a proxy request is issued the “raw data” commands are used to transfer the data in either direction.
Packet format:

NotCompatible – Uses & Impact
Anonymous Web Browsing Service
Providing Access to Restricted Foreign Content Ad-Click Fraud
Web Site Optimization Fraud
APT Probing and Exfiltration
One user from Finland, roaming in the US, used over 165MBytes in less than two hours of airtime.
In the lab it averages 100MBytes per hour. Causes huge data bills
Caused the battery to run down quickly
Who knows what sites your phone in visiting!!!

Android malware analysis enables you to: Know what the malware does
Understand the threat level
Detect and remediate the infection
You should now know:
What tools are required
How to set up the network environment How to use the tools

Email: Twitter: @KevMcNamee
Questions?

程序代写 CS代考 加微信: cscodehelp QQ: 2235208643 Email: kyit630461@163.com

Posted in Uncategorized

Leave a Reply

Your email address will not be published. Required fields are marked *