Code Monkey home page Code Monkey logo

decoding-mirai-malware-traffic-with-chopshop's Introduction

Decoding Mirai Malware Traffic with Chopshop

General Information

This is a presentation that covers using the open source tool Chopshop developed by Mitre to decode the Mirai DDoS Botnet command and control traffic.

Why should we care?

Malware must run, and most malware wants to communicate. This communciation can do various things for malware actors including but not limited to:

  • Exfiltrating stolen data and credentials
  • Sending DDoS attacks
  • Sending and retieving malicious instructions

Identifying and understanding these communications could give us insight behind the tools, tactics and procedures used by malicious actors and their motives. Once you have a clear understanding of the malware traffic you can create network signatures to detect this traffic and use the communication details to anticipate future behavior. For instance, if you have a malware command and control server that sends a DDoS attack details to an infected computer. You can expect that their will soon be DDoS attack traffic coming from the infected host. Knowing the target, attack type and duration allows defenders to prevent this traffic by blocking the target and/or packet types. However not all malware communication is straight forward and easy to interpret. Often times the malware traffic is encoded or encrypted to prevent inspection by malware analysts and network defenders.

To solve this analysis on the malware can to be done to identify how to decode its traffic, then tools such as Chopshop can be used to automatically decode the traffic. Chopshop developed by Mitre corp. This tool takes pcap files and provides the ability to run modules against them to conduct analysis. In additional to providing modules for general use, users are able to create their own modules for particular malware they are interested in. In this presentation I have analyzed Mirai command and control traffic to develop a module that would decode this traffic and extract information.

Three Main Ideas

  1. Most malware communicates as an essential part of its progression towards its objectives.
  2. Sometimes malware traffic is encoded or decrypted making it difficult to understand
  3. Tools like chopshop can be used to create modules that will automatically decode this traffic into a meaningful format.

Conclusion

With Mitre's Chopshop, I was able to create a module that would decipher the Mirai DDoS Botnet command and control traffic. This process can be adapted to decode any malware or network traffic.

Future Direction

In the future this research can be expanded upon by incorporating additonal modules and external libraries to provide coverage for more malware families.

Additional Resources

decoding-mirai-malware-traffic-with-chopshop's People

Contributors

tjnel avatar

Stargazers

 avatar  avatar

Watchers

 avatar  avatar

Recommend Projects

  • React photo React

    A declarative, efficient, and flexible JavaScript library for building user interfaces.

  • Vue.js photo Vue.js

    ๐Ÿ–– Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.

  • Typescript photo Typescript

    TypeScript is a superset of JavaScript that compiles to clean JavaScript output.

  • TensorFlow photo TensorFlow

    An Open Source Machine Learning Framework for Everyone

  • Django photo Django

    The Web framework for perfectionists with deadlines.

  • D3 photo D3

    Bring data to life with SVG, Canvas and HTML. ๐Ÿ“Š๐Ÿ“ˆ๐ŸŽ‰

Recommend Topics

  • javascript

    JavaScript (JS) is a lightweight interpreted programming language with first-class functions.

  • web

    Some thing interesting about web. New door for the world.

  • server

    A server is a program made to process requests and deliver data to clients.

  • Machine learning

    Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.

  • Game

    Some thing interesting about game, make everyone happy.

Recommend Org

  • Facebook photo Facebook

    We are working to build community through open source technology. NB: members must have two-factor auth.

  • Microsoft photo Microsoft

    Open source projects and samples from Microsoft.

  • Google photo Google

    Google โค๏ธ Open Source for everyone.

  • D3 photo D3

    Data-Driven Documents codes.