23
© 2008 Team Cymru Stephen Gill Chief Scientist Team Cymru Malware Hash Registry Harnessing the power of AntiVirus Aggregation January, 2009 CONFIDENTIAL © 2008 Team Cymru

malware hash registry - NANOG ArchiveEnter, the Malware Hash Registry • In a nutshell: query our service for a computed MD5 or SHA‐1 hash of a file – if it is known malware we

  • Upload
    others

  • View
    2

  • Download
    0

Embed Size (px)

Citation preview

Page 1: malware hash registry - NANOG ArchiveEnter, the Malware Hash Registry • In a nutshell: query our service for a computed MD5 or SHA‐1 hash of a file – if it is known malware we

©2008TeamCymru

Stephen Gill Chief Scientist Team Cymru

Malware Hash Registry Harnessing the power of AntiVirus Aggregation

January, 2009

CONFIDENTIAL ©2008TeamCymru

Page 2: malware hash registry - NANOG ArchiveEnter, the Malware Hash Registry • In a nutshell: query our service for a computed MD5 or SHA‐1 hash of a file – if it is known malware we

©2008TeamCymru

Agenda

CONFIDENTIAL ©2008TeamCymru

•  Introduction•  Purpose•  Access•  Usage,Tools,Applications•  Statistics•  LookingtotheFuture•  Conclusion

Page 3: malware hash registry - NANOG ArchiveEnter, the Malware Hash Registry • In a nutshell: query our service for a computed MD5 or SHA‐1 hash of a file – if it is known malware we

©2008TeamCymru

•  Began as a hobby in 1998; Incorporated in 2004. •  Network of researchers dedicated to supporting the

Internet community in maintaining security; non-profit •  Funded by multinational banks, CERTs/CSIRTS, security

vendors… and you? •  Global investigators previously from Dutch NHTCC, UK

Scotland Yard, Polish Police, USSS •  OurMission:TheWHOandtheWHY

Copyright©2008TeamCymru

Page 4: malware hash registry - NANOG ArchiveEnter, the Malware Hash Registry • In a nutshell: query our service for a computed MD5 or SHA‐1 hash of a file – if it is known malware we

©2008TeamCymru

TheInternet

Page 5: malware hash registry - NANOG ArchiveEnter, the Malware Hash Registry • In a nutshell: query our service for a computed MD5 or SHA‐1 hash of a file – if it is known malware we

©2008TeamCymru

Malware’sEffectontheInternet

Page 6: malware hash registry - NANOG ArchiveEnter, the Malware Hash Registry • In a nutshell: query our service for a computed MD5 or SHA‐1 hash of a file – if it is known malware we

©2008TeamCymru

Malware

•  SamplesSkyrocketing:onenewvirusevery2seconds

•  Vectors:–  people–  mobileviruses–  DriveBydownloads–  fileinfectors(ievirut)–  USBdrives.spreadinglikewildfireinAsiaPac–  Officeprograms–  Middleman:arppoisoning

Page 7: malware hash registry - NANOG ArchiveEnter, the Malware Hash Registry • In a nutshell: query our service for a computed MD5 or SHA‐1 hash of a file – if it is known malware we

©2008TeamCymru

Enter,theMalwareHashRegistry

•  Inanutshell:queryourserviceforacomputedMD5orSHA‐1hashofafile–  ifitisknownmalwarewedisplayanAVdetectionRateandlastseentimestamp

•  SimilartoIPtoASNreleasedseveralyearsago:– http://www.team‐cymru.org/Services/ip‐to‐asn.html

– TranslatesIpstoBGPASNsviaWhoisandHTTP– Highlysuccessful

Page 8: malware hash registry - NANOG ArchiveEnter, the Malware Hash Registry • In a nutshell: query our service for a computed MD5 or SHA‐1 hash of a file – if it is known malware we

©2008TeamCymru

Enter,theMalwareHashRegistry

•  ComplementsAVextremelywell.– MaintainingHashesinsignaturesisimpractical(1(1GB+size)

– Wetakecareofthatbystoringitinthecloud

– LetsAVcontinuetodowhatitdoesbest:detectmalwarebasedonsignaturesandheuristics.

•  Freefornon‐commercialuse

Page 9: malware hash registry - NANOG ArchiveEnter, the Malware Hash Registry • In a nutshell: query our service for a computed MD5 or SHA‐1 hash of a file – if it is known malware we

©2008TeamCymru

AccessMethods

•  AccessisavailableovertheInternetvia:– Whois:TCP43– Netcat:TCP43(bulkwhois)– DNS:UDP53

•  Possiblycominglater:–  InstantMessaging–  HTTP–  Yourideashere…

Page 10: malware hash registry - NANOG ArchiveEnter, the Malware Hash Registry • In a nutshell: query our service for a computed MD5 or SHA‐1 hash of a file – if it is known malware we

©2008TeamCymru

Architecture

MHRMalwareDB AVQueue

Queries

Page 11: malware hash registry - NANOG ArchiveEnter, the Malware Hash Registry • In a nutshell: query our service for a computed MD5 or SHA‐1 hash of a file – if it is known malware we

©2008TeamCymru

Usage•  Whois&Netcat

•  DNS

Page 12: malware hash registry - NANOG ArchiveEnter, the Malware Hash Registry • In a nutshell: query our service for a computed MD5 or SHA‐1 hash of a file – if it is known malware we

©2008TeamCymru

Applications

•  Hardware–  Comingsoontoaroutervendornearyou…

–  BROappliance–  Yourideashere…

•  Software

-  MailServers-  Forensics-  Poorman’sAV

-  TheSky’sthelimit

Page 13: malware hash registry - NANOG ArchiveEnter, the Malware Hash Registry • In a nutshell: query our service for a computed MD5 or SHA‐1 hash of a file – if it is known malware we

©2008TeamCymru

SneakPeek:WinMHR

Page 14: malware hash registry - NANOG ArchiveEnter, the Malware Hash Registry • In a nutshell: query our service for a computed MD5 or SHA‐1 hash of a file – if it is known malware we

©2008TeamCymru

AV’sEffectiveness

•  Wecollectapproximately~30K+uniquemalwaresamplesperday.

•  UsingcurrentAVsignaturesandenginesfrom32AVvendors,thedetectionrateiscirca28%.

•  30dayslaterthedetectionratecanbeashighas50%.Yay.:/

Page 15: malware hash registry - NANOG ArchiveEnter, the Malware Hash Registry • In a nutshell: query our service for a computed MD5 or SHA‐1 hash of a file – if it is known malware we

©2008TeamCymru

MHR’sEffectiveness

•  AccordingtoOnePrivatestudy:– MHRimprovedAV’shitrateby50%!

•  ContributionsWelcomed!!!– AVengines(fromvendor)– Malwaresamples– Suggestionsforimprovement– Moralsupport– Coffee

Page 16: malware hash registry - NANOG ArchiveEnter, the Malware Hash Registry • In a nutshell: query our service for a computed MD5 or SHA‐1 hash of a file – if it is known malware we

©2008TeamCymru

MHR’sAdoption

•  Inthefirst5days,over750kqueries•  10M+queriesinJan2009

•  BROAddoninthefirstdayhttp://wiki.github.com/sethhall/bro_scripts/the‐malware‐hash‐

registry‐and‐bro‐ids

RealtimeHTTPMonitoring

•  LinuxHostActiveScanning

Page 17: malware hash registry - NANOG ArchiveEnter, the Malware Hash Registry • In a nutshell: query our service for a computed MD5 or SHA‐1 hash of a file – if it is known malware we

©2008TeamCymru

FutureAddons

•  KernelDrivertowatchfornewprocesses•  MonitoringofsubprocessesandDLLs(svchost.exe)

Page 18: malware hash registry - NANOG ArchiveEnter, the Malware Hash Registry • In a nutshell: query our service for a computed MD5 or SHA‐1 hash of a file – if it is known malware we

©2008TeamCymru

FAQ•  HowdoIinterprettheoutput?

•  It’snottoobad,justtwonumberstoworryabout:timestamp(unix),anddetectionrate

•  Howdoyoucollectmalware?

•  Howdon’twecollectmalware...•  CanIdownloadyourhashregistrydatabase?

•  Itisnotpublicallyavailable,butyoumaycontactusaboutadatasharingagreement.

•  CanIhaveasampleofthefile…?

•  PleaseseetheFAQ

Page 19: malware hash registry - NANOG ArchiveEnter, the Malware Hash Registry • In a nutshell: query our service for a computed MD5 or SHA‐1 hash of a file – if it is known malware we

©2008TeamCymru

FAQ•  WhichAVEngines?

•  Undisclosed•  Tellmemoreaboutyourmalwaredatabase?

•  Talktomeafterwards.•  ShouldIjuststopusingananti‐viruspackage?

•  NO!PleasecontinuetouseAV!•  Howup‐to‐dateisyourregistry?

•  Updatedonce,daily.•  HowdoIreportaFalsePositive?

•  http://www.team‐cymru.org/Services/MHR/

Page 20: malware hash registry - NANOG ArchiveEnter, the Malware Hash Registry • In a nutshell: query our service for a computed MD5 or SHA‐1 hash of a file – if it is known malware we

©2008TeamCymru

TeamCymrucanHelpYou!•  Detection

– Flows, Feeds, Compromised devices – Have questions about your network or IPs?

Talk to me afterwards. •  Investigation

– Cyber who dunnit? •  Prevention •  Mitigation •  Collaboration

Page 21: malware hash registry - NANOG ArchiveEnter, the Malware Hash Registry • In a nutshell: query our service for a computed MD5 or SHA‐1 hash of a file – if it is known malware we

©2008TeamCymru

Thank you for your time!

Copyright©2008TeamCymru

Page 22: malware hash registry - NANOG ArchiveEnter, the Malware Hash Registry • In a nutshell: query our service for a computed MD5 or SHA‐1 hash of a file – if it is known malware we

©2008TeamCymru

ConcludingRemarks

•  Questions?

Page 23: malware hash registry - NANOG ArchiveEnter, the Malware Hash Registry • In a nutshell: query our service for a computed MD5 or SHA‐1 hash of a file – if it is known malware we

©2008TeamCymru

MoreInformation

•  http://www.team‐cymru.org/Services/MHR/