-
Backdoors, Logic Bombs, and Rootkits
-
Backdoor
- An (often secret) method of bypassing normal authentication or encryption.
-
Backdoors are often used to:
- secure remote access to a computer
- obtain access to plain text data in cryptographic systems.
-
Logic Bomb
- Code that sets off malware once specified conditions are met.
- Logic bombs are very likely to be inside jobs.
-
Rootkits
- A collection of computer malware, designed to enable high-level access to a computer. Rootkits often mask their existence, and may mask the existence of other software.
-
Rootkits deliver a variety of payloads:
- Backdoors
- Botnet Agents
- Adware or Spyware
-
Rootkit Types:
-
User-Mode Rootkits:
- Operates in Ring 3 of the Windows Protection Ring model (user mode).
- Privilege must be escalated to own the box.
-
Kernel-Mode Rootkits:
- Operates in Ring 0 of the Windows Protection Ring model (kernel mode).
-
Boot Rootkits (Bootkits):
- Replaces the boot loader with one controlled by the rootkit.
-
Hypervisor Level Rootkits:
- Exploits hardware virtualization features to (technically) run in Ring -1.
- Hosts the target OS as a VM.
- This rootkit can intercept hardware calls made by the original OS.
- Unlike normal hypervisors, they do not have to load before the OS.
-
Firmware Rootkit:
- Uses firmware to create a persistent malware image of a router, NIC, hard drive, or system BIOS.
- This type of rootkit is less likely to be detected because firmware is not usually inspected for code integrity.
-
Malware Evasion Methods
-
Polymorphism
- A class of virus that changes its signature when it replicates. This makes it much harder for an anti-virus program to detect.
- Most anti-malware software uses signature detection, which compares suspected malware to a malware pattern (signature) database, also called a repository.
- Malware is detected only if it matches an existing signature.
-
Polymorphic malware commonly evades detection using one or both of these methods:
- Encryption
- Prepending and Appending
-
Armor
-
These three types of programs are used by modern attackers to deliver malware. When used, they make it much less likely for malware to be detected:
-
Wrappers:
- A program used to combine two or more executables into a single packaged program.
- Also referred to as:
- Binders
- Packagers
- EXE Binders
-
Packers:
- Compress files to obfuscate malware activity.
- Similar in function to:
- WinZip
- Rar
- Tar
-
Crypters:
- Encrypt the code.
- Some crypters apply an encryption algorithm such as:
- AES
- RSA
- Blowfish
- Less sophisticated crypters might use more basic obfuscation techniques such as:
- XOR
- Base64 Encoding
- ROT13
- Examples:
- Morphine
- Trojan Man
- Pretty Good Malware Protection
- Restorator
- CypherX
-
Other techniques used to armor a piece of malware include:
- Writing the malware in assembly language so that it is not detected by signatures.
- Blocking the use of system debuggers.
- Detecting and preventing the malware from executing within a sandbox environment.