SlideShare uma empresa Scribd logo
1 de 20
Baixar para ler offline
Fragmented Distribution Attack
Virus Bulletin Annual Conference 2009, Geneva
September 18, 2009
Author: Anoirel S. Issa
MessageLabs, now part of Symantec
Anoirel_issa@symantec.com
Fragmented Distribution Attack:
     Abstract


Through the years there has been a constant evolution of anti-virus evasion
techniques. One of the latest trend that has been widely witnessed is the
process code injection.

However, a technique which has not been previously disclosed and may
lead to some irreversible consequences is the “Fragmented Distribution Attack”.

The scenario: An email with an attached image arrives in your mailbox from a
recognized sender, you double click and open it. As expected, the image is
displayed and nothing else happens. The system administrator may not
have noticed anything suspicious from his system monitor logs and everything
looks fine as the anti-virus product, along with the firewall, remain silent.

Under this silence, the computer is possibly being compromised by a Fragmented Distribution
Attack.




                                                                                  2
Agenda



• An attempt to define the Fragmented Distribution Attack
  (FDA)
• Exposing the attack: case study
      • The mystery of the bodiless header
• P.O.C embedded code fragments and re-assembler
• Live variant of a fragmented distribution attack
• Consequences and possible implications
• Detecting FDA
• Conclusion
                                                            3
Terminology:
Fragmented Distribution Attack


• A new AV evasion technique
• Aim to bypass Firewalls, IDS and Anti-virus
• Exploiting different file formats for distribution
• Code fragments embedded in innocent files
• Fragment re-assembler used to rebuild original threat
• Fragments locator – within the re-assembler




                                                          4
Exposing the Attack



• File format exploitation and abuse
• Data fragments embedded in normal file
• Embedding code in innocent files a new method?
• Not a new technique: seen on exploits
• So what differentiates FDA to embedding technique?




                                                       5
A Schematic View of an FDA:
Fragment Distribution


                          • 1 malware split
                               in 3 fragments
                          • Segments embedded
                            in innocent files
                          • Fragment carriers
                            sent over the
                            protected network




                                            6
The Fragment Re-assembler



                       •    A separate program
                       •    Not necessarily malware
                       •    Locates fragment carriers
                       •    Pre-assemble fragment in
                            memory
                       •    May write code to disk
                       •    Executes re-assembled
                            code in MEM or on Disk
                       •    System compromised
                                            7
Case 1: Uncovered Live
Fragment


                         •   Embedded PE Header
                         •   No other PE
                             characteristics
                         •   No encryption
                         •   Clearly isolated
                             fragment
                         •   Remaining part is
                             elsewhere
                         •   Possibly an FDA
                                                8
Detection of the previous live
fragment


                           •     Discovered in
                                 2008
                           •     7 AV detects
                                 the header
                                 today
                           •     Confusion:
                           - Dropper?
                           - Downloader?
                           - No description
                           Why ? an FDA?
What if the sample was an
    FDA?


•      Conclusion about previous sample:
•      Isolated fragment – no shellcode - no encryption
•      What if our conclusion was 100% accurate?
•      How would that work?
•      How a single fragment of a PE file would be used
       and executed to compromise systems?
•      FDA is the answer.
•      How would an FDA work then?
•      Research results and FDA POC follows
FDA Proof of concept:
The Goat and the Smiling Image



                                 To validate our
                                 deduction of FDA in the
                                 previous case we
                                 develop an FDA POC
                                 using the image in the
                                 left and a goat file




                                                   11
Fragment 1: PE header



                        •   Goat file fragment
                            embedded in the
                            image
                        •   Image displays
                        •   No visible alteration
                        •   Fragment detected by
                            1 AV




                                              12
Fragment 2 & 3:
Code Section & Sec Table


                           • Fragment
                             marker “DEAD”
                           • Fragment order
                             3-2
                           • Image displays
                           • No detection




                                              13
Extending the POC:
Infectious Fragments: W32.Virut



                              •   Not modified Virut
                                  sample
                              •   “Unanimously”
                                  detected




                                                   14
Extending the POC:
Infectious Fragments: W32.Virut



                              •   4 fragments
                              - embedded in same
                                   image
                              •   Not detected:
                                      - 4 fragments
                              •   PE Header fragment
                                  detected
                                      - 1 AV spotted
                                      the MZ/PE
                                                   15
A Serious Attack: Live sample



•      September 09 – FDA variant seen live
        • Targeting financial institutions


         • Use old shell code technique to run re-
           assembler code
•      Use of fragment marker
•      Hacked PE header values
•      Fragments of entire files
•      Attack involves: Rootkit - information stealer
•      Use Http to send / receive data
FDA:
    The Consequences


•     If successfully achieved, an FDA attack can
      result to some serious consequences
•     Depends on the victim's level of protection
•     Consequence not easily predictable but can lead
      to:
        • Data, intellectual property leakage
        • Government, military, industrial espionage
        • Irreversible financial losses
Detecting Fragmented
    Distribution Attacks


•     Detection would be tricky but possible
•     Depend on your scan engine capabilities
Conclusion



•     Hope you enjoyed this presentation which aimed
      to:
        - bring this type of threat to light


        - not demonstrating malware distribution
          technique for hackers
E.O.F.
Questions?
Thank you.
anoirel_issa@symantec.com
      Also on LinkedIn  20

Mais conteúdo relacionado

Semelhante a Anoirel Issa Vb2009

Anti-virus Mechanisms and Various Ways to Bypass Antivirus detection
Anti-virus Mechanisms and Various Ways to Bypass Antivirus detectionAnti-virus Mechanisms and Various Ways to Bypass Antivirus detection
Anti-virus Mechanisms and Various Ways to Bypass Antivirus detectionNeel Pathak
 
Toorcon Seattle 2011 - Browser Exploit Packs
Toorcon Seattle 2011 - Browser Exploit PacksToorcon Seattle 2011 - Browser Exploit Packs
Toorcon Seattle 2011 - Browser Exploit PacksAditya K Sood
 
GTB Data Loss Prevention
GTB Data Loss PreventionGTB Data Loss Prevention
GTB Data Loss Preventionrefaeli
 
Inception: Tips and tricks I’ve learned reversing vulnerabilities!
Inception: Tips and tricks I’ve learned reversing vulnerabilities!Inception: Tips and tricks I’ve learned reversing vulnerabilities!
Inception: Tips and tricks I’ve learned reversing vulnerabilities!Nelson Brito
 
E is for Endpoint II: How to Implement the Vital Layers to Protect Your Endpo...
E is for Endpoint II: How to Implement the Vital Layers to Protect Your Endpo...E is for Endpoint II: How to Implement the Vital Layers to Protect Your Endpo...
E is for Endpoint II: How to Implement the Vital Layers to Protect Your Endpo...Lumension
 
Maemo 6 Platform Security
Maemo 6 Platform SecurityMaemo 6 Platform Security
Maemo 6 Platform SecurityPeter Schneider
 
Malware Collection and Analysis via Hardware Virtualization
Malware Collection and Analysis via Hardware VirtualizationMalware Collection and Analysis via Hardware Virtualization
Malware Collection and Analysis via Hardware VirtualizationTamas K Lengyel
 
Offensive malware usage and defense
Offensive malware usage and defenseOffensive malware usage and defense
Offensive malware usage and defenseChristiaan Beek
 
EMBA Firmware analysis - TROOPERS22
EMBA Firmware analysis - TROOPERS22EMBA Firmware analysis - TROOPERS22
EMBA Firmware analysis - TROOPERS22MichaelM85042
 
Owning windows 8 with human interface devices
Owning windows 8 with human interface devicesOwning windows 8 with human interface devices
Owning windows 8 with human interface devicesNikhil Mittal
 
Yow connected developing secure i os applications
Yow connected   developing secure i os applicationsYow connected   developing secure i os applications
Yow connected developing secure i os applicationsmgianarakis
 
Technical Workshop - Win32/Georbot Analysis
Technical Workshop - Win32/Georbot AnalysisTechnical Workshop - Win32/Georbot Analysis
Technical Workshop - Win32/Georbot AnalysisPositive Hack Days
 
Sans london april sans at night - tearing apart a fileless malware sample
Sans london april   sans at night - tearing apart a fileless malware sampleSans london april   sans at night - tearing apart a fileless malware sample
Sans london april sans at night - tearing apart a fileless malware sampleMichel Coene
 
AWS Chicago talk from John Downey - Containers and security
AWS Chicago talk from John Downey - Containers and securityAWS Chicago talk from John Downey - Containers and security
AWS Chicago talk from John Downey - Containers and securityAWS Chicago
 
Reversing banking trojan: an in-depth look into Gataka
Reversing banking trojan: an in-depth look into GatakaReversing banking trojan: an in-depth look into Gataka
Reversing banking trojan: an in-depth look into Gatakajiboutin
 
Boutin reversing banking trojan. an in-depth look into gataka
Boutin   reversing banking trojan. an in-depth look into gatakaBoutin   reversing banking trojan. an in-depth look into gataka
Boutin reversing banking trojan. an in-depth look into gatakaDefconRussia
 
Flash security past_present_future_final_en
Flash security past_present_future_final_enFlash security past_present_future_final_en
Flash security past_present_future_final_enSunghun Kim
 
Defending Behind the Mobile Device
Defending Behind the Mobile DeviceDefending Behind the Mobile Device
Defending Behind the Mobile DeviceTyler Shields
 
Detecting Evasive Malware in Sandbox
Detecting Evasive Malware in SandboxDetecting Evasive Malware in Sandbox
Detecting Evasive Malware in SandboxRahul Mohandas
 

Semelhante a Anoirel Issa Vb2009 (20)

Anti-virus Mechanisms and Various Ways to Bypass Antivirus detection
Anti-virus Mechanisms and Various Ways to Bypass Antivirus detectionAnti-virus Mechanisms and Various Ways to Bypass Antivirus detection
Anti-virus Mechanisms and Various Ways to Bypass Antivirus detection
 
Toorcon Seattle 2011 - Browser Exploit Packs
Toorcon Seattle 2011 - Browser Exploit PacksToorcon Seattle 2011 - Browser Exploit Packs
Toorcon Seattle 2011 - Browser Exploit Packs
 
GTB Data Loss Prevention
GTB Data Loss PreventionGTB Data Loss Prevention
GTB Data Loss Prevention
 
Spo2 t19 spo2-t19
Spo2 t19 spo2-t19Spo2 t19 spo2-t19
Spo2 t19 spo2-t19
 
Inception: Tips and tricks I’ve learned reversing vulnerabilities!
Inception: Tips and tricks I’ve learned reversing vulnerabilities!Inception: Tips and tricks I’ve learned reversing vulnerabilities!
Inception: Tips and tricks I’ve learned reversing vulnerabilities!
 
E is for Endpoint II: How to Implement the Vital Layers to Protect Your Endpo...
E is for Endpoint II: How to Implement the Vital Layers to Protect Your Endpo...E is for Endpoint II: How to Implement the Vital Layers to Protect Your Endpo...
E is for Endpoint II: How to Implement the Vital Layers to Protect Your Endpo...
 
Maemo 6 Platform Security
Maemo 6 Platform SecurityMaemo 6 Platform Security
Maemo 6 Platform Security
 
Malware Collection and Analysis via Hardware Virtualization
Malware Collection and Analysis via Hardware VirtualizationMalware Collection and Analysis via Hardware Virtualization
Malware Collection and Analysis via Hardware Virtualization
 
Offensive malware usage and defense
Offensive malware usage and defenseOffensive malware usage and defense
Offensive malware usage and defense
 
EMBA Firmware analysis - TROOPERS22
EMBA Firmware analysis - TROOPERS22EMBA Firmware analysis - TROOPERS22
EMBA Firmware analysis - TROOPERS22
 
Owning windows 8 with human interface devices
Owning windows 8 with human interface devicesOwning windows 8 with human interface devices
Owning windows 8 with human interface devices
 
Yow connected developing secure i os applications
Yow connected   developing secure i os applicationsYow connected   developing secure i os applications
Yow connected developing secure i os applications
 
Technical Workshop - Win32/Georbot Analysis
Technical Workshop - Win32/Georbot AnalysisTechnical Workshop - Win32/Georbot Analysis
Technical Workshop - Win32/Georbot Analysis
 
Sans london april sans at night - tearing apart a fileless malware sample
Sans london april   sans at night - tearing apart a fileless malware sampleSans london april   sans at night - tearing apart a fileless malware sample
Sans london april sans at night - tearing apart a fileless malware sample
 
AWS Chicago talk from John Downey - Containers and security
AWS Chicago talk from John Downey - Containers and securityAWS Chicago talk from John Downey - Containers and security
AWS Chicago talk from John Downey - Containers and security
 
Reversing banking trojan: an in-depth look into Gataka
Reversing banking trojan: an in-depth look into GatakaReversing banking trojan: an in-depth look into Gataka
Reversing banking trojan: an in-depth look into Gataka
 
Boutin reversing banking trojan. an in-depth look into gataka
Boutin   reversing banking trojan. an in-depth look into gatakaBoutin   reversing banking trojan. an in-depth look into gataka
Boutin reversing banking trojan. an in-depth look into gataka
 
Flash security past_present_future_final_en
Flash security past_present_future_final_enFlash security past_present_future_final_en
Flash security past_present_future_final_en
 
Defending Behind the Mobile Device
Defending Behind the Mobile DeviceDefending Behind the Mobile Device
Defending Behind the Mobile Device
 
Detecting Evasive Malware in Sandbox
Detecting Evasive Malware in SandboxDetecting Evasive Malware in Sandbox
Detecting Evasive Malware in Sandbox
 

Último

Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 

Último (20)

Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 

Anoirel Issa Vb2009

  • 1. Fragmented Distribution Attack Virus Bulletin Annual Conference 2009, Geneva September 18, 2009 Author: Anoirel S. Issa MessageLabs, now part of Symantec Anoirel_issa@symantec.com
  • 2. Fragmented Distribution Attack: Abstract Through the years there has been a constant evolution of anti-virus evasion techniques. One of the latest trend that has been widely witnessed is the process code injection. However, a technique which has not been previously disclosed and may lead to some irreversible consequences is the “Fragmented Distribution Attack”. The scenario: An email with an attached image arrives in your mailbox from a recognized sender, you double click and open it. As expected, the image is displayed and nothing else happens. The system administrator may not have noticed anything suspicious from his system monitor logs and everything looks fine as the anti-virus product, along with the firewall, remain silent. Under this silence, the computer is possibly being compromised by a Fragmented Distribution Attack. 2
  • 3. Agenda • An attempt to define the Fragmented Distribution Attack (FDA) • Exposing the attack: case study • The mystery of the bodiless header • P.O.C embedded code fragments and re-assembler • Live variant of a fragmented distribution attack • Consequences and possible implications • Detecting FDA • Conclusion 3
  • 4. Terminology: Fragmented Distribution Attack • A new AV evasion technique • Aim to bypass Firewalls, IDS and Anti-virus • Exploiting different file formats for distribution • Code fragments embedded in innocent files • Fragment re-assembler used to rebuild original threat • Fragments locator – within the re-assembler 4
  • 5. Exposing the Attack • File format exploitation and abuse • Data fragments embedded in normal file • Embedding code in innocent files a new method? • Not a new technique: seen on exploits • So what differentiates FDA to embedding technique? 5
  • 6. A Schematic View of an FDA: Fragment Distribution • 1 malware split in 3 fragments • Segments embedded in innocent files • Fragment carriers sent over the protected network 6
  • 7. The Fragment Re-assembler • A separate program • Not necessarily malware • Locates fragment carriers • Pre-assemble fragment in memory • May write code to disk • Executes re-assembled code in MEM or on Disk • System compromised 7
  • 8. Case 1: Uncovered Live Fragment • Embedded PE Header • No other PE characteristics • No encryption • Clearly isolated fragment • Remaining part is elsewhere • Possibly an FDA 8
  • 9. Detection of the previous live fragment • Discovered in 2008 • 7 AV detects the header today • Confusion: - Dropper? - Downloader? - No description Why ? an FDA?
  • 10. What if the sample was an FDA? • Conclusion about previous sample: • Isolated fragment – no shellcode - no encryption • What if our conclusion was 100% accurate? • How would that work? • How a single fragment of a PE file would be used and executed to compromise systems? • FDA is the answer. • How would an FDA work then? • Research results and FDA POC follows
  • 11. FDA Proof of concept: The Goat and the Smiling Image To validate our deduction of FDA in the previous case we develop an FDA POC using the image in the left and a goat file 11
  • 12. Fragment 1: PE header • Goat file fragment embedded in the image • Image displays • No visible alteration • Fragment detected by 1 AV 12
  • 13. Fragment 2 & 3: Code Section & Sec Table • Fragment marker “DEAD” • Fragment order 3-2 • Image displays • No detection 13
  • 14. Extending the POC: Infectious Fragments: W32.Virut • Not modified Virut sample • “Unanimously” detected 14
  • 15. Extending the POC: Infectious Fragments: W32.Virut • 4 fragments - embedded in same image • Not detected: - 4 fragments • PE Header fragment detected - 1 AV spotted the MZ/PE 15
  • 16. A Serious Attack: Live sample • September 09 – FDA variant seen live • Targeting financial institutions • Use old shell code technique to run re- assembler code • Use of fragment marker • Hacked PE header values • Fragments of entire files • Attack involves: Rootkit - information stealer • Use Http to send / receive data
  • 17. FDA: The Consequences • If successfully achieved, an FDA attack can result to some serious consequences • Depends on the victim's level of protection • Consequence not easily predictable but can lead to: • Data, intellectual property leakage • Government, military, industrial espionage • Irreversible financial losses
  • 18. Detecting Fragmented Distribution Attacks • Detection would be tricky but possible • Depend on your scan engine capabilities
  • 19. Conclusion • Hope you enjoyed this presentation which aimed to: - bring this type of threat to light - not demonstrating malware distribution technique for hackers