Ecosyste.ms: Awesome
An open API service indexing awesome lists of open source software.
https://github.com/rpisec/malware
Course materials for Malware Analysis by RPISEC
https://github.com/rpisec/malware
Last synced: 24 days ago
JSON representation
Course materials for Malware Analysis by RPISEC
- Host: GitHub
- URL: https://github.com/rpisec/malware
- Owner: RPISEC
- Created: 2016-01-08T16:10:44.000Z (almost 9 years ago)
- Default Branch: master
- Last Pushed: 2022-08-26T22:56:18.000Z (over 2 years ago)
- Last Synced: 2024-02-14T06:36:05.390Z (10 months ago)
- Homepage:
- Size: 11.3 MB
- Stars: 3,574
- Watchers: 332
- Forks: 798
- Open Issues: 0
-
Metadata Files:
- Readme: README.md
Awesome Lists containing this project
- awesome-security-collection - **2419**星
README
# Malware Analysis - CSCI 4976
This repository contains the materials as developed and used by [RPISEC](http://rpis.ec) to
teach Malware Analysis at [Rensselaer Polytechnic Institute](http://rpi.edu) in
Fall 2015. This was a university course developed and run soley by students, primarily using the
[Practical Malware Analysis](http://www.amazon.com/Practical-Malware-Analysis-Dissecting-Malicious/dp/1593272901)
book by Michael Sikorski and Andrew Honig, to teach skills in reverse engineering, malicious behaviour, malware,
and anti-analysis techniques.
## About the Course
The Practical Malware Analysis (PMA) book is where many RPISEC members and alumn started. The book reads very well,
is full of information, and the lab walkthroughs in the back are invaluable. We didn't want to re-invent the wheel so
we structured most of the class around the book. Students were expected to have read the relevant PMA book chapters
before class, allowing us to spend much more class time demonstrating skills and techniques and walking through
hands-on examples with the students.**Syllabus:** http://security.cs.rpi.edu/courses/malware-fall2015/Syllabus.pdf
**Note: Most of the samples used in this course are malicious in nature, treat them carefully!**
To help protect people from accidentaly running samples on an important machine, and to prevent anti-malware suites from
blocking the course material, **all of the samples are compressed and encrypted with a password of 'infected'.**### Course Abstract
>_With the increased use of the Internet and prevalence of computing systems in critical infrastructure, technology is undoubtedly a vital part of modern daily life. Unfortunately, the increasingly networked nature of the modern world has also enabled the spread of malicious software, or “malware”, ranging from annoying adware to advanced nation-state sponsored cyber-weaponry. As a result, the ability to detect, analyze, understand, control, and eradicate malware is an increasingly important issue of economic and national security._
>_This course will introduce students to modern malware analysis techniques through readings and hands-on interactive analysis of real-world samples. After taking this course students will be equipped with the skills to analyze advanced contemporary malware using both static and dynamic analysis._
### Prerequisite Knowledge
This course carried a prereq of
[Computer Organization - CSCI 2500](http://catalog.rpi.edu/preview_course_nopop.php?catoid=10&coid=16571)
at RPI. Computer Organization is RPI's basic computer architecture course that teaches
things like C, MIPS assembly, x86 assembly, Datapaths, CPU Pipelining, CPU Caching,
Memory Mapping, etc.Our expected demographic for Malware Analysis was students with zero reverse
engineering experience. That said, to be able to take this course
you will probably need at least the following skills.
* Working knowledge of C/C++
* Any assembly level experience### Lecture Breakdown
Lecture | Title | Topics
------- | ----- | ------
01 | Introduction | Syllabus, Basic Static Analysis, Basic Dynamic Analysis
02 | Advanced Static Analysis | x86, IDA, Code Constructs
03 | Analyzing Windows Programs | WinAPI, Handles, Windows Internals, Networking, COM
04 | Advanced Dynamic Analysis | Debugging Concepts and Tools
05 | Malware Behavior | Malicious Activities and Techniques
06 | Data Encoding and Malware Countermeasures | Hiding Data, Malware Countermeasures
07 | Covert Malware Launching | Covert Launching and Execution
08 | Anti-Analysis | Anti-Disassembly, Anti-VM, Anti-Debugging, Anti-AV
09 | Packing and Unpacking | Packers, Packing, and Unpacking
10 | Intro to Windows Kernel | Kernel Basics, Windows Kernel API, Windows Drivers, Kernel Debugging
11 | Rootkit Techniques | Hooking, Patching, Direct Kernel Object Manipulation
12 | Rootkit Anti-Forensics and Covert Channels | Anti-forensics, Covert Channels### Lab Breakdown
Lab | Topic
--- | -----
[01](/Labs/Lab_01) | Basic Analysis
[02](/Labs/Lab_02) | Advanced Static Analysis
[03](/Labs/Lab_03) | Analyzing Windows Programs
[04](/Labs/Lab_04) | Advanced Dynamic Analysis
[05](/Labs/Lab_05) | Malware Behavior
[06](/Labs/Lab_06) | Data Encoding and Malware Countermeasures
[07](/Labs/Lab_07) | Covert Malware Launching
[08](/Labs/Lab_08) | Anti Analysis
[09](/Labs/Lab_09) | Packing and Unpacking
[10](/Labs/Lab_10) | Windows Kernel### Project Breakdown
Project | Topic
------- | -----
[01](/Projects/Project_1) | Malware Behavior
[02](/Projects/Project_2) | Runtime Process Manipulation
[03](/Projects/Project_3) | Unpacking and Automation
[04](/Projects/Project_4) | APT Sample AnalysisLinks for additional exercises:
* [Practical Malware Analysis Labs](http://practicalmalwareanalysis.com/labs/)
* [Practical Reverse Engineering Labs](https://grsecurity.net/malware_research/)## Analysis Environment
Setting up a "safe" and usable analysis environment can range from easy to impossible,
depending on how far you want to go. The PMA book devotes an
entire chapter (Chapter 2) to this problem. For the purposes of this class, we
decided to set up a Windows 7 32-bit virtual machine. Unfortunately, while all the software
we used for the class is free, Windows is not, thus we cannot distribute this VM like we
distributed the Warzone for MBE. We have, however, included a comprehensive list, and a
collection of installers, of all the tools we used throughout the course. There are a few
"essentials" that we haven't listed but are still included in the installer package
(python, cygwin, etc).Visit the [releases](https://github.com/RPISEC/Malware/releases) page for the latest package.
### Tools
* [Dependency Walker](http://www.dependencywalker.com/)
* [Fakenet](http://practicalmalwareanalysis.com/fakenet/)
* [FileAlyzer 2.0](https://www.safer-networking.org/products/filealyzer/)
* [HxD](http://mh-nexus.de/en/hxd/)
* [IDA Free](https://www.hex-rays.com/products/ida/support/download_freeware.shtml)
* [ImpREC](https://tuts4you.com/download.php?view.415)
* [LordPE](http://www.woodmann.com/collaborative/tools/index.php/LordPE)
* [Malcode Analyst Pack](http://sandsprite.com/iDef/MAP/)
* [OllyDbg](http://www.ollydbg.de/)
* [PEiD](https://www.aldeid.com/wiki/PEiD)
* [PEview](http://wjradburn.com/software/)
* [Regshot](http://sourceforge.net/projects/regshot/)
* [Resource Hacker](http://www.angusj.com/resourcehacker/)
* [Sysinternals Suite](https://technet.microsoft.com/en-us/sysinternals/bb842062.aspx)
* [UPX](http://upx.sourceforge.net/)
* [Visual Studio](https://www.visualstudio.com/en-us/visual-studio-homepage-vs.aspx)
* [Windbg](https://msdn.microsoft.com/en-us/library/windows/hardware/ff551063(v=vs.85).aspx)
* [Wireshark](https://www.wireshark.org/)## Frequently Asked Questions
If you are ever stuck on a problem or have any questions, you're more than welcome to
ask on [IRC](#contact).#### What is the password to the zip files?
'infected', no quotes.#### Are these files malicious/dangerous?
Yes. Not all of them are malicious in nature, but most are. Always keep them inside a
proper analysis environment.#### Why are the lecture slides for XYZ so sparse?
Much of lecture time was spent in hands on examples, with the expectation that students
had read the material in the PMA book ahead of time. Thus the slide content referring
to material from the PMA book is meant as more of an outline. Read the chapters and then
go through the lab walkthroughs in the back of the PMA book, they are a great resource.#### Do you have videos of the lectures?
Sadly we did not record any of the lectures, maybe next time.#### Where can I learn more?
Play more wargames:
* [IO Wargame](https://io.netgarage.org/)
* [Pwnable KR](http://pwnable.kr/)
* [Pwnable TW](https://pwnable.tw/)
* [OverTheWire](http://overthewire.org/wargames/)
* [Reversing KR](http://reversing.kr/)
* [W3Challs](http://w3challs.com/)
* [crackmes.de](http://crackmes.de/)Reverse more samples:
* [Contagio](http://contagiodump.blogspot.com/)
* [Kernelmode.info](http://www.kernelmode.info/forum/)
* [Malware.lu](https://malware.lu/)
* [malwr](https://malwr.com/)
* [Hybrid Analysis](https://www.hybrid-analysis.com/recent-submissions?filter=file)The following books are excellent resources for expanding your knowledge of malware analysis and reverse engineering. We recommend working through them in the following order:
* Practical Malware Analysis
* Practical Reverse Engineering
* Rootkits: Subverting the Windows Kernel
* The Rootkit Arsenal: Escape and Evasion in the Dark Corners of the System
* Rootkits and Bootkits: Reversing Modern Malware and Next Generation ThreatsThese three books are also excellent:
* The Antivirus Hacker's Handbook
* The Art of Memory Forensics
* Windows InternalsAnd when they're happening, play [CTFs](https://ctftime.org/)!
#### I have a question, how can I get in touch with you?
Our club keeps a pretty active [IRC](http://rpis.ec/irc) presence. Someone there can probably
answer your question.**Server:** `irc.rpis.ec`
**Port:** `6667`, or `6697` (SSL)If you would like a more formal means of communication, you can reach us at `contact [at] rpis.ec`
# Licensing
This course was explicitly designed for academic & educational use only. Please keep this
in mind when sharing and distributing our course material. The specific licenses involved
can be found below.**Lecture Slides**
The lectures are covered by the Creative Commons Attribution-NonCommercial 4.0
International license [CC BY-NC 4.0](https://creativecommons.org/licenses/by-nc/4.0/legalcode).# Acknowledgements
Hundreds of hours and countless all nighters went into the production and execution of
this course. This section serves to recognize those who made all of this possible.## Original Authors
* Branden Clark
* Austin Ralls
* Aaron Sedlacek## Special Thanks
* The [RPI CS Department](http://www.cs.rpi.edu/) for giving us this opportunity and letting us run with it
* Professor Bülent Yener for sponsoring such a course
* Our students who put up with us all semester