Malware Forensics Workshop (APT - Part 1)
Date : |
5 August , 2011 (Friday)
|
Time : |
7:00 pm - 10:00 pm
|
Venue :
|
Room 1307, 13/F, Fortress Tower, 250 King's Road, North Point (Exit B, Fortress Hill MTR Station)
|
Equipment
required : |
Participants are required:
(1) to come with laptop installed with VMware, VMPlayer or VMFusion
(2) to prepare a 10G -15G hard disk spare space for holding all virtual machines
|
Outline : |
The workshop is an extension of our previous ZeuS malware workshop. Before we go into detail code analysis of Zeus malware, this time we are going to study an easier malware that we believe it belongs to the category of an Advanced Persistent Threat (APT). APT was defined, by MANDIANT, as a group of sophisticated, determined and coordinated attackers that have been systematically compromising a specific target or entity's networks for a prolonged period. We shall demo how to perform a dynamic analysis and to learn deeper usage of tools like, Process Explorer, Process Monitor, Autoruns, Regshot, CaptureBAT, Handlediff, PEiD, Bintext, Winobj, FileInsight, Stud_PE and more. Participants will be given chances to play around the tools on the APT malware with on hand guides. Detail code analysis will be performed in another workshops.
Suggested readings and online materials before the workshop :
http://www.princeton.edu/~yctwo/files/readings/M-Trends.pdf
http://www.mandiant.com/services/advanced_persistent_threat/
|
|