Environment Baseline |
Host Integrity Monitors |
Name: Advanced intrusion Detection Environment (AIDE) | ||||||||||
Page Reference: 414 | ||||||||||
Author/Distributor: Rami Lehti, Pablo Virolained (original developers); Richard van den Berg (maintainer); Hannes von Haugwitz (maintainer) |
||||||||||
Available From: http://aide.sourceforge.net/ |
||||||||||
Description: File integrity based intrusion detection system |
||||||||||
Helpful Switches:
|
Name: Samhain | ||||||||||
Page Reference: 414 | ||||||||||
Author/Distributor: Samhain Labs |
||||||||||
Available From: http://la-samhna.de/samhain/ |
||||||||||
Description: A flexible and powerful open-source host-based intrusion detection system (HIDS) that provides file integrity checking, log file monitoring, rootkit detection, port monitoring, detection of rogue executables and hidden processes. |
||||||||||
Helpful Switches:
|
Installation Monitors |
Name: Checkinstall | ||||
Page Reference: 415 | ||||
Author/Distributor: Felipe Eduardo Sánchez Díaz Durán |
||||
Available From: http://asic-linux.com.mx/~izto/checkinstall/ |
||||
Description: Command-line installation monitor based upon installwatch |
||||
Helpful Switches:
|
Environment Emulation |
Name: Internet Services Simulation Suite (INetSIM) |
Page Reference: 433 |
Author/Distributor: Thomas Hungenberg and Matthias Eckert |
Available From: http://www.inetsim.org/ |
Description: For use on Linux, FreeBSD/OpenBSD systems, INetSIM is a software suite for simulating common Internet services in a laboratory environment. Specifically developed to assist in the analysis of network behavior of unknown malware speciments, INetSIM provides the digital investigator a common control and logging platform for environment adjustment during dynamic analysis. As shown below in the figure (left), once INetSIM is invoked, emulated services are initiated causing local network sockets associated with the service to listen for network activity (shown on the figure, right). |
Name: fakedns |
|
Page Reference: 437 | |
Author/Distributor: Francisco Santos | |
Available From: http://code.activestate.com/recipes/491264-mini-fake-dns-server/ | |
Description: A Python script that creates a light-weight, fake, DNS server to direct DNS queries to a target system in your malware laboratory, demonstrated in the figure below.
|
Active System and Network Monitoring |
Process Monitoring |
Name: ps | ||||||||||||||||
Page Reference: 447 | ||||||||||||||||
Author/Distributor: Branko Lankester et. al. |
||||||||||||||||
Available From: Native to Linux systems |
||||||||||||||||
Description: Displays information about active processes |
||||||||||||||||
Helpful Switches:
|
Name: pstree | ||||||||||||||||||
Page Reference: 448 |
||||||||||||||||||
Author/Distributor: Werner Almesberger and Craig Small |
||||||||||||||||||
Available From: Native to most Linux distributions |
||||||||||||||||||
Description: Displays a textual tree hierarchy of running processes (parent/ancestor and child processes). |
||||||||||||||||||
Helpful Switches:
|
Name: pslist | ||||||
Page Reference: 447 | ||||||
Author/Distributor: Peter Penchev |
||||||
Available From: http://devel.ringlet.net/sysutils/pslist/; https://launchpad.net/ubuntu/lucid/i386/pslist/1.3-1 |
||||||
Description:A command-line tool to gather target process details, including process ID (PID), command name, and the PIDS of all child processes. Target processes may be specificed by name or PID. |
||||||
Helpful Switches:
|
Name: ips |
Page Reference: 447 |
Author/Distributor: David I. Bell |
Available From: http://freecode.com/projects/db-ips |
Description: A command-line tools that displays the status of actives processes. While the data displayed by ips is similar to ps, ips provides very granular control over output columns, selections and sorting. Similarly, like top, the output of ips can be continuously refreshed. |
Name: Process Dumper |
|
Page Reference: 450 |
|
Author/Distributor: Tobias Klein |
|
Available From: http://www.trapkit.de/research/forensic/pd/pd_v1.1_lnx.bz2; the companion analysis tool, Memory Parser, can be found at http://www.trapkit.de/research/forensic/mmp/index.html. |
|
Description: Process Dumper 1.1 is freeware, but is closed source and is used in tandem with the
|
File System Monitoring |
Name: lsof (list open files) |
||||||||||||||||
Page Reference: 420-421, 453-453 |
||||||||||||||||
Author/Distributor: Victor A. Abell |
||||||||||||||||
Available From: Native to Linux distributions; ftp://lsof.itap.purdue.edu/pub/tools/unix/lsof/ |
||||||||||||||||
Description: A command-line utility that displays open files and sockets. |
||||||||||||||||
Helpful Switches:
|
Name: fuser | ||||||||
Page Reference: 421 |
||||||||
Author/Distributor: Werner Almesberger; Craig Small |
||||||||
Available From: Native to most Linux distributions. | ||||||||
Description: Displays processes using files or sockets. |
||||||||
Helpful Switches:
|
Name: inotify | |
Page Reference: 421 |
|
Author/Distributor: Rohan McGovern |
|
Available From: Native to most Linux distributions as a part of inotify-tools; http://inotify-tools.sourceforge.net/ |
|
Description: Command-line file and directory monitoring tool. Inotify provides the digital investigator a simple and effective way to monitor target files and directories and gather meaningful information about file access, modification, creation, among other data, as shown in the figure below.
|
Name: File Alteration Monitor (FAM) |
Page Reference: 421 |
Author/Distributor: SGI |
Available From: http://oss.sgi.com/projects/fam/; http://oss.sgi.com/projects/fam/download.html |
Description: A file and directory monitoring tool that reveals when a file is created, modified, executed, and removed. |
Name: Gamin |
Page Reference: 412 |
Author/Distributor: Daniel Veillard |
Available From: https://people.gnome.org/~veillard/gamin/ |
Description: File and directory monitoring system defined to be a subset of the FAM system. |
Network Monitoring and Forensics |
Name: tcpdump | ||||||||||||||||||||
Page Reference: 426 | ||||||||||||||||||||
Author/Distributor: Tcpdump Team |
||||||||||||||||||||
Available From: http://www.tcpdump.org/; native to most Linux distributions |
||||||||||||||||||||
Description: A powerful and flexible command-line network sniffer and packet analyzer. |
||||||||||||||||||||
Helpful Switches:
|
Name: jpcap |
Page Reference: 427 |
Author/Distributor: Patrick Charles |
Available From: http://sourceforge.net/projects/jpcap/ |
Description: A Java-based network packet capture and visual analysis tool. |
Name: Network Miner |
Page Reference: 484 |
Author/Distributor: Netresec |
Available From: http://www.netresec.com/?page=NetworkMiner |
Description: A robust graphical network forensics tool that extracts, and in some instances reconstructs salient network artifacts into 11 different investigative aspects, including DNS queries, Files, Images, Messages, Cleartext, among others. Although primarly desgined to run in Windows environments, Network Miner can be run in Linux using Mono (http://www.netresec.com/?page=Blog&month=2011-12&post=No-more-Wine---NetworkMiner- in-Linux-with-Mono). |
Port Monitoring |
Name: netstat | ||||||||||||||||||||
Page Reference: 428-429 | ||||||||||||||||||||
Author/Distributor: Fred Baumgarten, et. al. |
||||||||||||||||||||
Available From: Native to Linux systems |
||||||||||||||||||||
Description: Displays information pertaining to established and “listening” network socket connections on the subject system. |
||||||||||||||||||||
Helpful Switches:
|
Name: KConnections |
Page Reference: 429 |
Author/Distributor: Dmitry Baryshev |
Available From: http://kde-apps.org/content/show.php/KConnections?content=71204 |
Description: Lightweight graphical wrapper for netstat.
|
System Call Monitoring and System Profiling |
Name: strace | ||||||||||||||||||||||||
Page Reference: 430, 456-459 |
||||||||||||||||||||||||
Author/Distributor: Paul Kranenburg, Branko Lankester, et. al. |
||||||||||||||||||||||||
Available From: Native to Linux systems but the project is maintained on SourceForge, http://sourceforge.net/projects/strace/ |
||||||||||||||||||||||||
Description: native utility on Linux systems that intercepts and records system calls that are made by a target process. |
||||||||||||||||||||||||
Helpful Switches:
|
Name: SysProf |
Page Reference: 430 |
Author/Distributor: Søren Sandmann Pedersen |
Available From: http://sysprof.com/; http://sysprof.com/sysprof-1.2.0.tar.gz |
Description: GUI-based system-wide profiler allowing the digital investigator to gather detailed statistical information about kernel and userspace applications, including functions used. |
Automated Malware Analysis FrameworksMonitoring |
Automated Malware Analysis Frameworks/Sandboxes |
Name: Buster Sandbox Analyzer ("Buster") |
Page Reference: 470 |
Author/Distributor: Buster |
Available From: http://bsa.isoftware.nl/ |
Description: A flexible and configurable sandbox platform based upon Sandboxie, a utility that creates an isolated abstraction area (sandbox) on a host system preventing changes from being made to the system. Buster monitors and analyzes the execution trajectory and behavior of malicious code specimens, including PE files, PDF files, Microsoft Office Documents, among others. Unlike many automated solutions, Buster allows the digital investigator to interact with the specimen when required (such as clicking on a dialogue box button or supplying missing libraries where needed). |
Name: ZeroWine and ZeroWine Tryouts |
Page Reference: 470 |
Author/Distributor: Joxean Koret |
Available From: http://zerowine.sourceforge.net/ and http://zerowine-tryout.sourceforge.net/ |
Description: Developed by Joxean Koret, both ZeroWine and ZeroWine Tryouts (an offshoot of the original ZeroWine project) are open source malicious code behavioral analysis platforms built on Debian Linux in QEMU virtual machines that emulate Windows systems using WINE. Intuitive to use, both systems provide the digital investigator with Web based upload and reporting consoles. While both systems can dynamically analyze Windows executable files, ZeroWine Tryouts can also conduct automated static analysis of PDF files. |
Name: Minibis |
Page Reference: 470 |
Author/Distributor: Christian Wojner/Austrian Computer Emergency Response Team (CERT.at) |
Available From: http://cert.at/downloads/software/minibis_en.html |
Description: Developed by the Austrian Computer Emergency Response Team (CERT.at), Minibis is a malicious code behavioral analysis framework based upon Oracle VirtualBox virtualization and scripting of third party malicious code monitoring utilities. |
Name: The Reusable Unknown Malware Analysis Net ("TRUMAN") |
Page Reference: 470 |
Author/Distributor: Joe Stewart |
Available From: http://www.secureworks.com/cyber-threat-intelligence/tools/truman/ |
Description: A native hardware-based solution developed by malware expert Joe Stewart of SecureWorks, TRUMAN operates on a client-server model with a custom Linux boot image to restore a fresh Windows “victim” system image after each malware specimen is processed. At the core of TRUMAN is a series of scripts to emulate servers (DNS, Web, SMTP, IRC, SQL, etc) and pmodump, a perl-based tool that parses physical memory for malicious process artifacts. Although TRUMAN is no longer supported, in 2009, Jim Clausing of the SANS Institute developed and published enhancements for the platform. |
Name: Cuckoo Sandbox |
Page Reference: 470 |
Author/Distributor: Claudio Guarnieri |
Available From: http://www.cuckoosandbox.org/ |
Description: An open source malicious code behavioral analysis platform that uses a Cuckoo Host system (core component that handles execution and analysis); Analysis Guests (isolated virtual machines on which malware is safely executed and behavior is reported back to the Cuckoo Host); and analysis packages (scripts that define automated operations that Windows should conduct during the analysis of a target specimen). |
Online Malware Analysis Sandboxes |
|
Embedded Artifact Extraction Revisited |
Disassemblers |
Name: Objdump |
||||||||||||||||||||
Page Reference: 472 |
||||||||||||||||||||
Author/Distributor: GNU | ||||||||||||||||||||
Available From: Native to most Linux distributions as a part of binutils; http://www.gnu.org/software/binutils/ |
||||||||||||||||||||
Description: Command-line utility to display the structure and contents of object files. |
||||||||||||||||||||
Helpful Switches:
|
Name: Dissy |
Page Reference: 472 |
Author/Distributor: Simon Kagstrom |
Available From: http://dissy.googlecode.com |
Description: GUI frontend to the objdump disassembler. |
Interacting with and Manipulating the Malware Specimen |
Prompting Trigger Events |
Name: HTTrack |
Page Reference: 477 |
Author/Distributor: Xavier Roche |
Available From: http://www.httrack.com |
Description: HTTrack is a graphical web site copying tool. A valuable tool for copying web site content for offline browsing and reconstructing web content locally, HTTrack offers granular configuration options for copying depth and content acquisition. |
Digital Virology |
Context Triggered Piecewise Hashing and Indicators of Likeness |
Name: SSDeep | ||||||||||||||||||||||
Page Reference: 499-500 | ||||||||||||||||||||||
Author/Distributor: Jesse Kornblum |
||||||||||||||||||||||
Available From: http://ssdeep.sourceforge.net/ |
||||||||||||||||||||||
Description: A fuzzy hashing tool which computes a series of randomly sized checksums for a file, allowing file association between files that are similar in file content but not identical. |
||||||||||||||||||||||
Helpful Switches:
|