Automated Extraction of Configuration and Payloads from Sophisticated Malware
44CON Information Security Conference via YouTube
Overview
Syllabus
Intro
A bit of background..
Malware Obfuscation
Manual Approach
Automated Analysis
Techniques & tools from manual analysis
Debugger
Dumper
Import Reconstruction
CAPE Walkthrough Demo Plug
DLL Side loading
Extracting/loading modules in memory
Process injection: Shellcode or DLL
Process Hollowing (RunPE)
Executable Packers/Custom Crypto
Current Coverage
CAPE Extensibility
How do you make a package? CAPE API
Config Parsing
CAPE Resources
Taught by
44CON Information Security Conference