578.3 Flashcards
HEXANE
Identified mid-2018 with activity ongoing. Targeting oil and gas in the Middle East. Has links to other groups but is a unique cluster of tradecraft and victimology.
Malware human fingerprints are?
Maps to the Capability / TTP vertices of the Diamond Model. Depending on your requirement, can support all four points of the Diamond Model. Human fingerprints include:
- Header metadata
- Code reuse
- Configuration data
Malware configuration data - common types are:
PE version info Mutexes Text Formatting Method of persistence Communication details
Where do you get malware?
- First party data
- Partners
- Sharing Groups
- Commercial datasets
Common Malware analysis tools
VirusTotal
VT Enterprise
DC3 Malware Configuration Parser
malwareconfig.com
What’s the five major points of data pivoting?
- Critical CTI analyst skills
- Might seem like common sense, but often overlooked
- Quickly builds knowledge between automic indicators
- Historically manual, time-intensive
- New tools help to automate
What are the four steps of data pivoting?
Start -> Pivot -> Validate -> Identify
Basic (most pivotable) indicator types
- IP addresses
- Domains
- Accounts
- Unique Strings
C2 Domain registration
- Domains can be moved from IP to IP to allow for dynamic adversary infrastructure
- Typo-squatted domains can fool targeted users
- Three classes of C2 domains:
° Adversary registered
° Dynamic DNS domains (free or paid)
° Legitimate but compromised
DDNS
Dynamic DNS Domains
Originally developed for use with dynamic addressing ISPs such as DSL. Have short Time to Live (TTL) to expedite propagation.
ASN
Autonomous System Number. Determines organizational ownership of IP addresses.
Lookup tool: asn.cymru.com
Passive DNS
Collection of DNS domain query responses collected passively.
PDNS Providers
LookingGlass LGScout Mnemonic Farsight RiskIQ / PassiveTotal Internet Identity OpenDNS DomainTools
Iris
Iris is a powerful engine looking for collocations between domains, IPs, registrars, ASNs, emails ,etc.
GlassRAT
Uncovered in November 2015 by RSA. Previously undetected Trojan targeting Chinese nationals. In operation for at least 3 years.