330 likes | 526 Views
Top Botnets and how MAEC can help keep you out of their clutches. Robert A. Martin , Principal Engineer, MITRE Corporation. Top 5 Bots by Class. Data Theft Bots. Spam Bots. Data Theft Bots - Zeus.
E N D
Top Botnetsand how MAEC can help keep you out of their clutches • Robert A. Martin, Principal Engineer, MITRE Corporation
Top 5 Bots by Class Data Theft Bots Spam Bots
Data Theft Bots - Zeus *Source: http://www.prevx.com/blog/112/ZEUS-steals-information-from-home-and-business-PCs.html
Spam Bots - Rustock *Source = http://www.messagelabs.com/mlireport/MLI_2010_08_August_Final_EN.pdf
Spam Bots – Pushdo *Source = http://www.messagelabs.com/mlireport/MLI_2010_08_August_Final_EN.pdf
Spam Bots – Grum *Source = http://www.messagelabs.com/mlireport/MLI_2010_08_August_Final_EN.pdf
Spam Bots – Bobax *Source = http://www.messagelabs.com/mlireport/MLI_2010_08_August_Final_EN.pdf
Spam Bots – Storm *Source = http://www.messagelabs.com/mlireport/MLI_2010_08_August_Final_EN.pdf
Malware Attribute Enumeration and Characterization (MAEC) & Bots
Why Do We Need to Develop Standards for Malware? Lots of products Multiple layers of protection Inconsistent reports There’s an arms race
Correlate, Integrate, Automate Threats Detection Vulnerabilities Response Platforms
Rise of New Threats Symantec Global Internet Security Threat Report, Volume XIII, 4/2008 Background Nimda or I-Worm or Readme? Oct 2004 Initial CME discussions at VB Conference Feb 2005 CME Submission Server Oct 2005 CME public announcement and website Jan 2007 39 CME IDs assigned Feb 2007 DHS SwA Forum Malware WG Dec 2009 MAEC public website Jun 2010 Initial MAEC Schema
Malware Attribute Enumeration and Characterization (MAEC) Focus on attributes and behaviors, not intent and malware families
MAEC Use Cases Tool Tool • Operational • Analysis • Help Guide Analysis Process • Standardized Tool Output • Malware Repositories
MAEC & MSM Standards High-level Mechanisms The attack pattern(s) exhibited by a malware mechanism or behavior. CAPEC Mid-level Behaviors CVE The vulnerabilities targeted by a malware behavior. Low-level Actions CPE The platform(s) targeted by a malware action. CEE The event(s) associated with a malware action. The host-based object(s) created or modified by a malware action. OVAL
MAEC & Zeus – Host Based Detection I • Malware Analysis Engine • Anubis • CWSandbox • ThreatExpert • Etc. Engine Output Zeus Binary Sandbox -> MAEC Translator Host-based Scanner
MAEC & Zeus – Host Based Detection IIReal World Example OVAL Output Anubis Output* Anubis MAEC Translator Script MAEC Output Anubis Sandbox Zeus Binary MAEC OVAL Translator Script *http://anubis.iseclab.org/?action=result&task_id=1167a57d1aa905e949df5d5478ab23bf9
MAEC Schema Overview – Initial Release ActionType BehaviorType ObjectType …
MAEC & Zeus: Profiling C2 MAEC Mechanism: C2 MAEC Behavior: Get Configuration MAEC Behavior: Beacon MAEC Behavior: Receive Command MAEC Behavior: Send Data
MAEC & Zeus C2 I Mechanism: C2 MAEC Behavior: C2 Get Configuration Protocol: HTTP Encryption Type: RC4/custom Behavior: Get Configuration Behavior: Beacon MAEC Action: http_get Behavior: Recv Command • MAEC Object: tcp_connection • External IP: xxx.xxx.xxx.xxx • External Port: 80 • MAEC Object: http_connection • Method: GET • Parameter: /config.bin • Response: HTTP/1.1 200 OK • Response Body: <encrypted config.bin file> • Response Content Length: 1212 bytes Behavior: Send Data
MAEC & Zeus C2 II Mechanism: C2 • MAEC Behavior: C2 Beacon • Protocol: HTTP • Encryption Type: RC4/custom • Frequency: 1/20 minutes Behavior: Get Configuration Behavior: Beacon Behavior: Recv Command MAEC Action: http_post Behavior: Send Data • MAEC Object: tcp_connection • External IP: xxx.xxx.xxx.xxx • External Port: 80 • MAEC Object: http_connection • Method: POST • POST Data: <encrypted statistics> • Parameter: .*/gate.php • Response: HTTP/1.1 200 OK • Response Body: <encrypted static string> • Response Content Length: 44 bytes
MAEC & Zeus C2 III Mechanism: C2 • MAEC Behavior: C2 Receive Command • Protocol: HTTP • Encryption Type: RC4/custom • Supported Commands: reboot, kos, shutdown, bc_add, bc_del, block_url, unblock_url, block_fake, getfile, getcerts, resetgrab, upcfg, rename_bot … Behavior: Get Configuration Behavior: Beacon Behavior: Recv Command Behavior: Send Data MAEC Action: decode_http_response • MAEC Object: tcp_connection • External IP: xxx.xxx.xxx.xxx • External Port: 80 • MAEC Object: http_connection • Response Body: <encrypted command string> • Response Content Length: > 44 bytes
MAEC & Zeus C2 IV Mechanism: C2 • MAEC Behavior: C2 Send Data • Protocol: HTTP • Encryption Type: RC4/custom Behavior: Get Configuration Behavior: Beacon MAEC Action: http_post Behavior: Recv Command Behavior: Send Data • MAEC Object: tcp_connection • External IP: xxx.xxx.xxx.xxx • External Port: 80 • MAEC Object: http_connection • Method: POST • POST Data: <encrypted stolen data> • Parameter: .*/gate.php • Response: HTTP/1.1 200 OK
Emerging Collaboration • Related MSM Efforts • There is significant overlap between MAEC, CAPEC, and CEE in describing observed actions, objects, and states. • As such, we’re working on developing a common schematic structure of observables for use in these efforts: • Others • Feature requests on Handshake group, discussion list • Anubis & ThreatExpert translators are being developed as a result of a user request • We encourage submission of any other such requests
MAEC Community: Discussion List • Request to join: http://maec.mitre.org/community/discussionlist.html • Archives available
MAEC Community: MAEC Development Group on Handshake • MITRE hosts a social networking collaboration environment: https://handshake.mitre.org • Supplement to mailing list to facilitate collaborative schema development
Future Development Plans • Expand MAEC coverage of network attributes • Possible focus: bots/botnets • Create RDF/OWL ontology based on MAEC schema • Revise schema to better support characterization of relationships between actions/behaviors • Implement common observables schema • Based on MAEC/CAPEC/CEE collaboration • Encourage and invite more participation in the development process • MAEC Website: http://maec.mitre.org (contains MAEC Discussion list sign-up) • MAEC Handshake Group
Summary • MAEC is attempting to address many of the issues that are integral to accurate and unambiguous communication about malware • The adoption of MAEC will facilitate new methods of correlation and automation against malware • MAEC is an open, collaborative effort. It needs expertise and input from various parties in order to be successful