97, 2/4 ȸ¿ø°¡ÀÔ  ·Î±×ÀΠ 
   babyalpha
   http://www.babyalpha.net
   Malware_Part4.rtf (16.7 KB), Download : 2     [¿À¸¥ÂÊ ¹öÆ° ´­·¯ ´Ù¿î ¹Þ±â]
   4¹ø ÆÄÆ® ¹ø¿ª ¿Ã¸³´Ï´Ù.

http://www.hackerschool.org/HS_Boards/zboard.php?id=HS_Translate&no=74 [º¹»ç]


RTF Æ÷¸äÀ¸·Î ÷ºÎÇÏ¿´½À´Ï´Ù.
º»¹®¿¡µµ C&PÇؼ­ ¿Ã¸®°Ú½À´Ï´Ù.

¸Û¸Û´Ô, ¾î¶²½ÄÀ¸·Î ¿Ã·Áµå¸®´Â°Ô ÀÚ¸·ÀÛ¾÷ÇϽǶ§ ÆíÇÒÁö ¸ð¸£°Ú¾î¼­ ÷ºÎ¿Í °Ô½Ã±Û º»¹®¿¡ ÀÛ¼ºÇÕ´Ï´Ù.
¾î¶² Æ÷¸äÀ¸·Î ¿Ã¸®´Â°Ô ÆíÇÑÁö ¾Ë·ÁÁÖ½Ã¸é ±×·¸°Ô ´Ù½Ã ÀÛ¾÷Çؼ­ ¿Ã¸®°Ú½À´Ï´Ù.

Àß ¾Èµé¸®´Â ºÎºÐÀÌ Á» Àֳ׿ä. ¼ö½Ê¹ø Ʋ¾î¼­ µé¾îºÃ´Âµ¥... *** ó¸®ÇÏ¿´½À´Ï´Ù.

ù¹ø° ºÐ¼®ÇÑ ¾Ç¼ºÄÚµå ¸íÀÌ ¾Èµé¸³´Ï´Ù. ¤Ð
À̺κÐÀº ²À Àû¾î¾ßÇÑ´Ù°í »ý°¢ÀÌ µå´Âµ¥¿ä. ÀÎÅͳݿ¡ ã¾ÆºÁµµ ¾î¶² ¾Ç¼ºÄڵ带 ºÐ¼®Çß´ÂÁö¿¡ ´ëÇؼ­
ÀÚ¼¼È÷ ³ª¿ÍÀÖ´Â °÷ÀÌ ¾ø³×¿ä. (Á¦°¡ °Ë»öÀ» Àß ¸øÇßÀ»¼öµµ ÀÖ±¸¿ä¤Ð¤Ð)
¾Ç¼ºÄÚµå¸íÀ» °è¼Ó µé¾îº¸´Âµ¥ "¿À»Ú·³" Á¤µµ µé¸®´Âµ¥... ÀÌ°Ô ¸ÕÁö ¸ð¸£°Ú³×¿ä. (µµ¿òÀÌ ÇÊ¿äÇÕ´Ï´Ù)

4ÆÄÆ® 26ÃʺκÐÀÔ´Ï´Ù.

´ñ±Û·Î¶óµµ ¾Ë·ÁÁÖ½Ã¸é ±× ºÎºÐ ¼öÁ¤ÇÏ°Ú½À´Ï´Ù.


---- ¹ø¿ª

um, and then finally,
¾Æ, ±×¸®°í ¸¶Áö¸·À¸·Î,
towards some where towards at the end,
ÇÁ·¹Á¨Å×ÀÌ¼Ç ³¡ºÎºÐÂë¿¡¼­,
if you want to do a structural clean up.
±¸Á¶ÀûÀ¸·Î Á¤¸®¸¦ ÇÒ °ÍÀÔ´Ï´Ù.
meaning that, again,
¶Ç ¸»¾¸ µå¸®Áö¸¸,
I'll show you couple of examples here.
Á¦°¡ ¸î°¡Áö ¿¹Á¦¸¦ º¸¿©µå¸®°Ú½À´Ï´Ù.
IDA Pro is not appropriate,
IDA Pro´Â ÀûÇÕÇÏÁö ¾Ê½À´Ï´Ù.
it doesn't tag everything properly,
¸ðµç Äڵ带 Á¤È®ÇÏ°Ô Ç¥½ÃÇÏÁö ¸øÇÕ´Ï´Ù.
it miss interpret some things,
¸î¸î ÄÚµå Çؼ®ÀÌ À߸ø  Ç¥±âµË´Ï´Ù.
so often time you have to go back
±×·¡¼­, º»ÀÎÀÌ Á÷Á¢ À߸øµÈ ºÎºÐÀ» ã¾Æ¼­
and mark something as a function,
ÇÔ¼ö·Î Ç¥±â¸¦ ¹Ù²Ù°Å³ª,
mark something as a string,
½ºÆ®¸µÀ¸·Î ¹Ù²ãÁÖ´Â
and is a bunch of clean up work.
Á¤¸® ÀÛ¾÷ÀÌ ÇÊ¿äÇÕ´Ï´Ù.
some of this is valuable,
Äڵ带 ÀÌ·¸°Ô Á¤¸®ÇØÁÖ´Â ÀÛ¾÷ÀÌ,
sometimes, filling in other parts of the programming.
¸Å¿ì À¯ÀÍÇÒ °æ¿ìµµ ÀÖ½À´Ï´Ù.

So, I'm going to do a demo,
Á¦°¡ ¿À´ÃÀÇ ºÐ¼® µ¥¸ð¸¦ º¸¿©µå¸®°Ú½À´Ï´Ù.
and a this is a trojan called "the Ope***"
À̹ø¿¡ º¼ »ùÇÃÀº "the Oper***" ¶ó´Â Æ®·ÎÀ̸ñ¸¶ÀÔ´Ï´Ù.
but actually we've got two trojans to demo today,
¼ÖÁ÷È÷ ¿À´Ã, µÎ°³ÀÇ Æ®·ÎÀ̸ñ¸¶ µ¥¸ð°¡ ÁغñµÇ¾î ÀÖ½À´Ï´Ù.
it's coincidence that the two things I picked in ***** being trojans.
¿À´ÃÀÇ µ¥¸ð°¡ ¿ì¿¬È÷ µÎ°³ÀÇ Æ®·ÎÀ̸ñ¸¶·Î ¼±Á¤µÇ¾ú½À´Ï´Ù.

This is the trojan
À̹ø Æ®·ÎÀ̸ñ¸¶´Â
that was recently in the news for having been found in use in Israel,
¾ó¸¶Àü À̽º¶ó¿¤¿¡¼­ »ç¿ëµÇ¾ú´Ù°í ´º½º¿¡¼­ ¹ßÇ¥ µÇ¾ú½À´Ï´Ù.

bunch of *** I guess ****** pieces.

so this was a sample I was provided,
Á¦°¡ ¹ÞÀº »ùÇà Ʈ·ÎÀ̸ñ¸¶À̸ç,
um¡¦ and I'm going to take a brief look at.
À½¡¦ ÀÌ°ÍÀ» °£´ÜÈ÷ »ìÆ캸µµ·Ï ÇÏ°Ú½À´Ï´Ù.

Now, this thing, as you will see, is actually huge.
º¸½Ã¸é, ÆÄÀÏÀÇ »çÀÌÁî°¡ ¸Å¿ì Å®´Ï´Ù.
It's 500K.
¹«·Á 500KBÀ̳ª µË´Ï´Ù.
This is about, and most of it's code,
ÀÌ »çÀÌÁî°¡ °ÅÀÇ ÄÚµå·Î ±¸¼º µÇ¾îÀÖ½À´Ï´Ù.
this is about 10 times larger than your typical piece of malicious code that we¡¯ll be looking at.
º¸Åë º¸°ÔµÇ´Â ¾Ç¼ºÄڵ庸´Ù 10¹èÁ¤µµ Å« »çÀÌÁî ÀÔ´Ï´Ù.

I'm going to go through it extremely quickly, because it's massive.
ÆÄÀÏ »çÀÌÁî°¡ ¸Å¿ì Å©¹Ç·Î ÁøÇàÀ» ºü¸£°Ô ÇÏ°Ú½À´Ï´Ù.
And I can't possibly have enough time to show you everything that I would like to.
¸ðµç ºÎºÐÀ» »ó¼¼ÇÏ°Ô ¼³¸íÇϱâ À§Çؼ­´Â ½Ã°£ÀÌ ÃæºÐÇÏÁö ¾Ê½À´Ï´Ù.
So pardon me if I gloss everything a little bit and go quickly
Á¦°¡ ¼³¸íÀ» ´ëÃæÇÏ°í ºü¸£°Ô ³Ñ¾î°¡µµ ÀÌÇØÇØÁֽñ⠹ٶø´Ï´Ù.
but um.. otherwise we wouldn't be able to finish.
À½¡¦ ±×·¸Áö ¾ÊÀ¸¸é ¿À´Ã ³¡³»Áö ¸øÇÒ°Í °°³×¿ä.

Let's just keep an eye on the time.
(¼³¸íÇϴµ¿¾È) ½Ã°£À» °è¼Ó È®ÀÎÇØÁֽñ⠹ٶø´Ï´Ù.

Um, you can see the actual executable there,
À½, ¿©±â¿¡ ½ÇÁ¦ ½ÇÇàÆÄÀÏÀ» º¸½Ç¼ö ÀÖ½À´Ï´Ù.
uh cup of coffee there Asheley.
¾Ö½¯¸®, Ä¿ÇÇ Á» ºÎŹÇØ¿ä.
I¡¯ve gone ahead and made pre¡¦ IDB file.
µ¥¸ðÀü¿¡ ¹Ì¸® IDB ÆÄÀÏÀ» ¸¸µé¾ú½À´Ï´Ù.
And What this is,
ÀÌ°ÍÀÌ ¹«¾ùÀ̳ĸé,
this is a copy of the Trojan just after IDA Pro finished  it¡¯s initial auto analysis.
Æ®·ÎÀ̸ñ¸¶ ÆÄÀÏÀ» IDA ProÀÇ ÀÚµ¿ ºÐ¼® °á°ú¸¦ º¹»çÇÑ °ÍÀÔ´Ï´Ù.
If you¡¯re an IDA Pro user you may be familiar with this stuff.
IDA Pro¸¦ »ç¿ëÇϽô ºÐÀ̶ó¸é ÀÌÇظ¦ Àß ÇϽǰŶó »ý°¢µË´Ï´Ù.
It loads it up, it goes through and identifies all the pieces.
IDA Pro·Î ÆÄÀÏÀ» ·ÎµåÇÏ¸é ¸ðµç ºÎºÐÀ» ½Äº°ÇÕ´Ï´Ù.
The light blue are the library functions,
ÇϴûöÀº ¶óÀ̺귯¸® ÇÔ¼öÀÔ´Ï´Ù.
Pink is import table,
ÇÎÅ©»öÀº ÀÓÆ÷Æ® Å×À̺íÀ̸ç,
The dark blue is your typical programming code.
£Àº ÆĶõ»öÀº ¼Ò½ººÎºÐÀÔ´Ï´Ù.
The reason I didn¡¯t show you this is, it took 11 minutes on my laptop,
Á¦ ³ëÆ®ºÏÀ¸·Î ÀÚµ¿ºÐ¼®ÀÌ 11ºÐÀ̳ª °É·Á¼­ À§ÀÇ °úÁ¤À» º¸¿©µå¸®Áö ¾Ê¾Ò½À´Ï´Ù.
Which is quite a long time.
ÀÌÁ¤µµ¸é ¸Å¿ì ±ä ½Ã°£ÀÔ´Ï´Ù.
It¡¯s not ****** laptop, but that¡¯s a lot longer than sort of things normally takes.
ÃֽŠ³ëÆ®ºÏÀÌ ¾Æ´Ï±ä ÇÏÁö¸¸ Æò±ÕÀûÀ¸·Î ÀÌ·¸°Ô ±ä ½Ã°£À» ÇÊ¿ä·Î ÇÏÁö ¾Ê½À´Ï´Ù.
And¡¦ um¡¦ I didn¡¯t, certainly didn¡¯t need any filler time for this talk.
±×¸®°í, À½¡¦, ÀÌ µ¥¸ð¸¦ À§ÇÑ Ãß°¡ ¼³¸í ½Ã°£ÀÌ ÇÊ¿äÄ¡ ¾Ê¾Ò±â ¶§¹®¿¡
So, I skipped that step,
ÀÚµ¿ºÐ¼®Àº »ý·«ÇÏ¿´½À´Ï´Ù.
um, and again, as I mentioned,
À½, ±×¸®°í Á¦°¡ ¾Æ±îµµ ¾ð±ÞÇÏ¿´µíÀÌ,
if you¡¯re not a IDA Pro user,
IDA Pro »ç¿ëÀÚ°¡ ¾Æ´Ï¶ó¸é,
it goes through, it¡¯s got some, some *******, some other tricks ******,

library files, programs, and a bunch of other ******

the grey and brown are typically data sections.
ȸ»ö°ú °¥»ö ºÎºÐÀÌ µ¥ÀÌÅÍ ¿µ¿ªÀÔ´Ï´Ù.
or some other sort of things tagged as data, um, executable code.
µ¥ÀÌÅÍ·Î ºÐ·ùµÇ´Â ½ÇÇàÄÚµå Àϼöµµ ÀÖ½À´Ï´Ù.
Um¡¦ There¡¯s ¡¦. Couple of problems that we have with this particular thing.
À½¡¦ ±×¸®°í ¿©±â º¸½Ã¸é ¸î°¡Áö ¹®Á¦Á¡À» º¸½Ç¼ö ÀÖ½À´Ï´Ù.
First of all, here¡¯s the entry point, winmain,
ù¹ø°·Î, ¿©±â º¸½Ã¸é ¿£Æ®¸® Æ÷ÀÎÆ®ÀÎ winmainÀ» È®ÀÎÇÒ¼ö ÀÖ½À´Ï´Ù.
and um¡¦, if you expand it,  
±×¸®°í À½¡¦, ÀÌ ºÎºÐÀ» ÆîÄ¡°Ô µÇ¸é
doesn¡¯t actually have any terribly distinct in it.
ƯÀÌÇÑ ºÎºÐÀÌ ¾ø½À´Ï´Ù.
So Ok, It's got a sub function,
±×·¡¼­ º¸½Ã¸é ¿©±â ¼­ºê ÇÔ¼öµéÀÌ Àֳ׿ä.
let¡¯s take a look at that and see what¡¯s below here.
¼­ºê ÇÔ¼öÀÇ ³»ºÎ°¡ ¾î¶»°Ô µÇ¾îÀÖ´ÂÁö º¸°Ú½À´Ï´Ù.
And again the blue and pink are kind of key visual indicators,
¾Æ, ±×·¡°í ¿©±â ÆĶõ»ö, ÇÎÅ©»öÀÌ ´«¿¡ º¸ÀÌ´Â ´Ü¼­¶ó ÇÒ¼ö ÀÖ°Ú½À´Ï´Ù.
uh¡¦, this things are all library calls.
À½¡¦, ÀÌ·±°ÍÀÌ ¶óÀ̺귯¸® È£Ã⠺κÐÀÔ´Ï´Ù.
The black would normally indicate our program.
°ËÁ¤»öÀº ÁÖ·Î ¸ÞÀÎ ÇÁ·Î±×·¥À» ÀǹÌÇÕ´Ï´Ù.
And you can take a look and see, this winmain doesn¡¯t point,
Á¦°¡ ºÃÀ»¶§´Â ¿©±â winmainÀº
at least not directly as far as I was concerned, to any of our code.
µ¥¸ð¿¡ º¸½Ã´Â Äڵ带 Á÷Á¢ È£ÃâÇÏÁö ¾Ê½À´Ï´Ù.
Second problem you see is that,
¿©±â¿¡¼­ º¸ÀÌ´Â µÎ¹ø° ¹®Á¦´Â,
we have a lot of, um.., unidentified functions that appear to be get called by library functions.
¶óÀ̺귯¸® ÇÔ¼ö·ÎºÎÅÍ È£Ã⠵Ǵ ¿©·¯°³ÀÇ ½Äº°µÇÁö ¾ÊÀº ÇÔ¼ö°¡ º¸Àδٴ °ÍÀÔ´Ï´Ù.
This means we¡¯ve missed identification of some of the libraries.
ÀÌ°ÍÀº ¿©±â¿¡¼­ ¸î¸îÀÇ ¶óÀ̺귯¸® ÇÔ¼ö¸¦ À߸ø ½Äº°Çß´Ù´Â °ÍÀÔ´Ï´Ù.
And in this particular code,  as I¡¯ll demonstrate, this ends up being a huge problem.
Á¦°¡ µ¥¸ð¸¦ Çϸ鼭 º¸½Ã°ÚÁö¸¸, ÀÌ·¯ÇÑ Æ¯Á¤ ºÎºÐµéÀÌ ºÐ¼®¿¡ À־ Å« ¹®Á¦Á¡ÀÌ µË´Ï´Ù.
A real annoyance at least with this particular program.
ÀÌ ÇÁ·Î±×·¥À» ºÐ¼®Çϸ鼭 ¸Å¿ì °ï¶õÇß´ø ºÎºÐÀÔ´Ï´Ù.
I¡¯m going to skip how I found the entry point in detail,
Á¦°¡ ¿£Æ®¸® Æ÷ÀÎÆ®¸¦ ¾î¶»°Ô ãÀºÁö´Â »ý·«ÇÏ°Ú½À´Ï´Ù.
**** say that this is an AFX application,
ÀÌ°ÍÀÌ AFX ¾îÇø®ÄÉÀ̼ÇÀ̶ó°í »ý°¢Çغ¾´Ï´Ù.
if you¡¯ve done any Microsoft programming
±×¸®°í ¸¸¾à ¸¶ÀÌÅ©·Î¼ÒÇÁÆ® ÇÁ·Î±×·¡¹ÖÀ» Çغ¸½ÅºÐÀº
and this is kind of a cut down version of the graphics, libraries and bunch of other stuff. **** extends C++
ÀÌ·¯ÇÑ °ÍÀÌ C++ÀÇ ±×·¡ÇÈ, ¶óÀ̺귯¸® ȤÀº ´Ù¸¥ ÇÁ·Î±×·¡¹ÖÀÇ °£¼Ò¹öÀüÀ̶ó »ý°¢ÇϽǼö ÀÖ½À´Ï´Ù.
Most likely, and sure enough looking at the rest of the code this programs was done in lots of C++.
ÀÌ ÇÁ·Î±×·¥À» Âß Àо½Ã¸é C++·Î Á¦À۵Ǿî Á³´Ù¶ó°í »ý°¢µÇ¾îÁú¼ö ÀÖÀ¸¸ç ½ÇÁ¦·Îµµ ¸¹Àº ºÎºÐÀÌ C++·Î µÇ¾îÀÖ½À´Ï´Ù.


  Hit : 1654     Date : 2011/08/01 11:18



    
72   6¹ø ÆÄÆ® ¾Èµé¸®´Â °Íµé ¸¹ÀÌ ¸øÇ߳׿䠠   ahotsuna
08/02 1780
71   ÆÄÆ® 2¹ø ºÐ·®ÀÔ´Ï´Ù. (90% Á¤µµµÆ°í ¾ÆÁ÷ 10% - ¾à 30~40Ãʺз®- ¹Ì¿ÏÀÔ´Ï´Ù.))     CodeAche
08/02 1663
70   Á¦ 2ȸ ¹ø¿ª ÁøÇà»óȲ ´ñ±Û ¹Ù¶ø´Ï´Ù.[9]     ¸Û¸Û
08/02 1733
69   ÆÄÆ®1 ºÐ·®ÀÔ´Ï´Ù.     ¸Û¸Û
08/02 1890
68   ÆÄÆ®8 ºÐ·®ÀÔ´Ï´Ù.     lycan
08/02 1598
67   ¾ÆÁ÷¸¹ÀÌÇÏÁö¸øÇ߳׿䠠   d4rkang3l
08/01 1515
66   13¹ø ÆÄÆ® ¹ø¿ªÀÔ´Ï´Ù.     20500
08/01 1584
  4¹ø ÆÄÆ® ¹ø¿ª ¿Ã¸³´Ï´Ù.     babyalpha
08/01 1653
64   ´Ù¸¥ ºÐµéÀº ¾ó¸¶³ª Çϼ̳ª¿ä?[3]     ahotsuna
07/31 1677
63   ±âÇÑÀÌ...[3]     20500
07/31 1496
62   [Á¦ 2ȸ] ¹ø¿ª ÆÄÆ®°¡ Á¤ÇØÁ³½À´Ï´Ù[12]     ¸Û¸Û
07/18 1886
61   [Á¦ 2ȸ] µ¿¿µ»ó ÆÄÀÏ[1]     lycan
07/16 2685
60   [Á¦ 2ȸ] À¯Åõºê ¸µÅ©[1]     lycan
07/16 1759
59   [Á¦ 2ȸ] Á¦ 2ȸ ¸®½º´×&¹ø¿ª ÀÛ¾÷À» ½ÃÀÛÇÕ´Ï´Ù.[20]     ¸Û¸Û
07/14 2063
58   [1ȸ] recon - auditing source code ºÐÇÒ ÆÄÀÏÀÔ´Ï´Ù (ÃÑ 9°³)[8]     ¸Û¸Û
05/04 1874
57   [°øÁö] Á¦ 1ȸ ¹ø¿ª ½ºÄÉÁìÀÔ´Ï´Ù. (ÁøÇà»óȲÀ» °¢ÀÚ ´ñ±Û·Î update)[10]     ¸Û¸Û
05/03 1770
56   ÀÚ¸· - ÃÖÁ¾ ¼öÁ¤º»ÀÔ´Ï´Ù~     ¸Û¸Û
06/30 1598
55   ÀÚ¸· - darkangel´Ô °Í°ú lycan´Ô °Í ÅëÇÕ     ¸Û¸Û
06/22 1817
54   ÀÚ¸·[1]     d4rkang3l
06/21 1462
53   µÎ ¹ø° ¹ø¿ª ´ë»ó °ü·Ã..[5]     ¸Û¸Û
06/16 1879
52   ÀÚ¸·(¿µ¾î,Çѱ۸¸ ¿Ï¼º ½ÌÅ© ¿¡·¯)[1]     d4rkang3l
06/16 1715
51   ÀÚ¸· ¿Ã¸³´Ï´Ù~[4]     lycan
06/13 1591
50     [re] °³Çà ¹× ÀϺΠ¼öÁ¤ÇÑ ÀÚ¸· ¿Ã¸³´Ï´Ù.[1]     lycan
06/15 1593
49   ÀúÀÚ¸·ÀÌ¿ä(¹Ì¿Ï¼º)[1]     d4rkang3l
06/09 1497
48   Á¦ 1ȸ ¹ø¿ª ÀÚ¸· °ü·ÃÀÔ´Ï´Ù.     ¸Û¸Û
06/02 1669
[1] 2 [3][4]

Copyright 1999-2024 Zeroboard / skin by Hackerschool.org / Secure Patch by Hackerschool.org