感谢2023年的陪伴,2024年继续加油^_^
该系列文章将系统整理和深入学习系统安全、逆向分析和恶意代码检测,文章会更加聚焦,更加系统,更加深入,也是作者的慢慢成长史。漫漫长征路,偏向虎山行。享受过程,一起奋斗~
-
一.恶意软件概念
-
二.利用火绒批量标注恶意软件
-
1.恶意软件家族标注
-
2.火绒和Defender病毒家族比较
-
3.Defender恶意家族命名规则解析
-
三.恶意样本家族构造方法
-
四.Usenix Sec20恶意软件标注工作
-
五.总结
作者的github资源:
-
逆向分析:
-
https://github.com/eastmountyxz/
SystemSecurity-ReverseAnalysis
-
网络安全:
-
https://github.com/eastmountyxz/
NetworkSecuritySelf-study
一.恶意软件概念
二.利用火绒批量标注恶意软件
1.恶意软件家族标注
【1】2024-04-25 15:05:53,病毒防护,病毒查杀,自定义扫描, 发现9个风险项目
病毒库时间:2024-04-24 18:05
开始时间:2024-04-25 15:05
总计用时:00:00:01
扫描对象:30
扫描文件:15
发现风险:9
已处理风险:0
病毒详情:
风险路径:D:malwarexlm-00aadd0cee3b5, 病毒名:OMacro/Downloader, 病毒ID:59616ce1c492d8b8, 处理结果:暂不处理
风险路径:D:malwarexlm-00e27f49734eb, 病毒名:OMacro/Downloader.apd, 病毒ID:2574b5c72e2e144d, 处理结果:暂不处理
风险路径:D:malwarepe-0af925cd9d9a41, 病毒名:TrojanDownloader/Garveep.e, 病毒ID:a026193d7d90c6ff, 处理结果:暂不处理
风险路径:D:malwarepe-0b269bdd4c2d1, 病毒名:Worm/Agent.bk, 病毒ID:1f263d9824fa6f87, 处理结果:暂不处理
风险路径:D:malwareps-0d7a89ea2041, 病毒名:TrojanSpy/PS.PwStealer.c, 病毒ID:1d5e1914bc871b7d, 处理结果:暂不处理
风险路径:D:malwarexlm-00e0b16153772, 病毒名:OMacro/Dropper.gz, 病毒ID:5c6258daba21b931, 处理结果:暂不处理
风险路径:D:malwareps-beacon, 病毒名:Trojan/PS.Rozena.b, 病毒ID:85c6aa55da50614b, 处理结果:暂不处理
风险路径:D:malwareps-beacon-, 病毒名:Trojan/PS.Rozena.b, 病毒ID:85c6aa55da50614b, 处理结果:暂不处理
风险路径:D:malwarepe-00f60edc9acb15, 病毒名:HEUR:Trojan/HVM3, 病毒ID:5520f4434bc844ea, 处理结果:暂不处理
>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>
2.火绒和Defender病毒家族比较
Begin Resource Scan
Resource Path:D:malware
Result Count:7
Threat Name:Virus:Win32/Nemim.A
Resource Path:D:malwarepe-0a7c325973943
Threat Name:TrojanDownloader:O97M/ZLoader.ARJ!MTB
Resource Path:D:malwarexlm-00e27f49734eb
Number of Resources:2
Threat Name:TrojanDropper:PowerShell/Cobacis.B
Resource Path:D:malwareps-beacon-
Resource Path:D:malwareps-beacon
Threat Name:TrojanDownloader:O97M/EncDoc.DK!MTB
Resource Path:D:malwarexlm-00cf050ee5410d
Threat Name:Trojan:Win32/Tapaoux.A
Resource Path:D:malwarepe-0a812976b9412
Threat Name:TrojanDownloader:Win32/Garveep.B
Resource Path:D:malwarepe-0b269bdd4c2d1
Threat Name:TrojanDownloader:O97M/EncDoc.YAF!MTB
Resource Path:D:malwarexlm-00aadd0cee3b5
End Scan
3.Defender恶意家族命名规则解析
* Adware
* Backdoor
* Behavior
* BrowserModifier
* Constructor
* DDoS
* Exploit
* HackTool
* Joke
* Misleading
* MonitoringTool
* Program
* Personal Web Server (PWS)
* Ransom
* RemoteAccess
* Rogue
* SettingsModifier
* SoftwareBundler
* Spammer
* Spoofer
* Spyware
* Tool
* Trojan
* TrojanClicker
* TrojanDownloader
* TrojanNotifier
* TrojanProxy
* TrojanSpy
* VirTool
* Virus
* Worm
* AndroidOS: Android operating system
* DOS: MS-DOS platform
* EPOC: Psion devices
* FreeBSD: FreeBSD platform
* iOS: iPhone operating system
* Linux: Linux platform
* macOS: MAC 9.x platform or earlier
* macOS_X: macOS X or later
* OS2: OS2 platform
* Palm: Palm operating system
* Solaris: System V-based Unix platforms
* SunOS: Unix platforms 4.1.3 or lower
* SymbOS: Symbian operating system
* Unix: general Unix platforms
* Win16: Win16 (3.1) platform
* Win2K: Windows 2000 platform
* Win32: Windows 32-bit platform
* Win64: Windows 64-bit platform
* Win95: Windows 95, 98 and ME platforms
* Win98: Windows 98 platform only
* WinCE: Windows CE platform
* WinNT: WinNT
* ABAP: Advanced Business Application Programming scripts
* ALisp: ALisp scripts
* AmiPro: AmiPro script
* ANSI: American National Standards Institute scripts
* AppleScript: compiled Apple scripts
* ASP: Active Server Pages scripts
* AutoIt: AutoIT scripts
* BAS: Basic scripts
* BAT: Basic scripts
* CorelScript: Corelscript scripts
* HTA: HTML Application scripts
* HTML: HTML Application scripts
* INF: Install scripts
* IRC: mIRC/pIRC scripts
* Java: Java binaries (classes)
* JS: JavaScript scripts
* LOGO: LOGO scripts
* MPB: MapBasic scripts
* MSH: Monad shell scripts
* MSIL: .NET intermediate language scripts
* Perl: Perl scripts
* PHP: Hypertext Preprocessor scripts
* Python: Python scripts
* SAP: SAP platform scripts
* SH: Shell scripts
* VBA: Visual Basic for Applications scripts
* VBS: Visual Basic scripts
* WinBAT: Winbatch scripts
* WinHlp: Windows Help scripts
* WinREG: Windows registry scripts
* A97M: Access 97, 2000, XP, 2003, 2007, and 2010 macros
* HE: macro scripting
* O97M: Office 97, 2000, XP, 2003, 2007, and 2010 macros - those that affect Word, Excel, and PowerPoint
* PP97M: PowerPoint 97, 2000, XP, 2003, 2007, and 2010 macros
* V5M: Visio5 macros
* W1M: Word1Macro
* W2M: Word2Macro
* W97M: Word 97, 2000, XP, 2003, 2007, and 2010 macros
* WM: Word 95 macros
* X97M: Excel 97, 2000, XP, 2003, 2007, and 2010 macros
* XF: Excel formulas
* XM: Excel 95 macros
* .dam: damaged malware
* .dll: Dynamic Link Library component of a malware
* .dr: dropper component of a malware
* .gen: malware that is detected using a generic signature
* .kit: virus constructor
* .ldr: loader component of a malware
* .pak: compressed malware
* .plugin: plug-in component
* .remnants: remnants of a virus
* .worm: worm component of that malware
* !bit: an internal category used to refer to some threats
* !cl: an internal category used to refer to some threats
* !dha: an internal category used to refer to some threats
* !pfn: an internal category used to refer to some threats
* !plock: an internal category used to refer to some threats
* !rfn: an internal category used to refer to some threats
* !rootkit: rootkit component of that malware
* @m: worm mailers
* @mm: mass mailer worm
三.恶意样本家族构造方法
四.Usenix Sec20恶意软件标注工作
五.总结
行路难,多歧路。感谢家人的陪伴,小珞最近长大了很多,调皮又可爱,走路都在唱歌,希望她也一样。感谢大家2023年的支持和关注,让我们在2024年继续加油!分享更多好文章,感恩,娜璋白首。
前文回顾(下面的超链接可以点击喔):
-
[系统安全] 五十八.恶意软件分析 (10)利用火绒安全实现恶意样本家族批量标注(含学术探讨)
原文始发于微信公众号(娜璋AI安全之家):[系统安全] 五十八.恶意软件分析 (10)利用火绒安全实现恶意样本家族批量标注(含学术探讨)