๋ณธ๋ฌธ ๋ฐ”๋กœ๊ฐ€๊ธฐ

์ „์ฒด ๊ธ€68

[Emotet ๋ถ„์„ (1)] ํŒŒ์ผ ์ •๋ณด ์ˆ˜์ง‘ ๋ฐ ์–ธํŒจํ‚น(Unpacking) ์ด๋ฒˆ์—๋Š” Emotet ์•…์„ฑ์ฝ”๋“œ๋ฅผ ๋ถ„์„ํ•ด๋ณด๊ฒ ์Šต๋‹ˆ๋‹ค.๋จผ์ € ํŒŒ์ผ์— ๋Œ€ํ•œ ์ •๋ณด๋ฅผ ์ˆ˜์ง‘ํ•˜๊ณ  ํŒจํ‚น๋˜์—ˆ๋‹ค๋ฉด ์–ธํŒจํ‚น์„ ์ˆ˜ํ–‰ํ•ด๋ณด๊ฒ ์Šต๋‹ˆ๋‹ค.์ƒ˜ํ”Œ ํ•ด์‹œ(SHA256)๋Š” ed22dd68fd9923411084acc6dc9a2db1673a2aab14842a78329b4f5bb8453215์ž…๋‹ˆ๋‹ค.   [ํŒŒ์ผ ์ •๋ณด ์ˆ˜์ง‘]๋จผ์ € ์—ฌ๋Ÿฌ ๋„๊ตฌ๋ฅผ ์‚ฌ์šฉํ•˜์—ฌ ์ƒ˜ํ”Œ์— ๋Œ€ํ•œ ์ •๋ณด๋ฅผ ์ˆ˜์ง‘ํ•ด๋ณด๊ฒ ์Šต๋‹ˆ๋‹ค. 1. Virus Total  2. CAPA VirusTotal๊ณผ CAPA๋ฅผ ํ†ตํ•ด ๋‹ค์Œ๊ณผ ๊ฐ™์€ ์ •๋ณด๋ฅผ ์–ป์—ˆ์Šต๋‹ˆ๋‹ค.Emotet ์•…์„ฑ์ฝ”๋“œ์ฝ”๋“œ ์ธ์ ์…˜ ์ •ํ™ฉC2 IP ์ฃผ์†Œ ๋ชฉ๋กRC4 ์•Œ๊ณ ๋ฆฌ์ฆ˜PE ์„น์…˜ ์—ด๊ฑฐ  3. Die Die๋ฅผ ํ†ตํ•ด ๋‹ค์Œ๊ณผ ๊ฐ™์€ ์ถ”๊ฐ€ ์ •๋ณด๋ฅผ ์–ป์„ ์ˆ˜ ์žˆ์Šต๋‹ˆ๋‹ค.MS Visual C++ 2005๋ฅผ ์‚ฌ์šฉํ•œ ์ปดํŒŒ์ผMFC ๋ผ์ด๋ธŒ๋Ÿฌ๋ฆฌ ํฌํ•จ๋น„๊ต์  ๋†’์€ .te.. 2025. 2. 21.
Malware Analysis Series (MAS) – Article 3 Alexandre Borges์˜ ๋ธ”๋กœ๊ทธ Exploit Reversing์˜ ์•…์„ฑ์ฝ”๋“œ ๋ถ„์„ ์‹œ๋ฆฌ์ฆˆ 'Malware Analysis Series(MAS)'๋ฅผ ๋ฆฌ๋ทฐํ•˜๋ฉฐ ๊ณต๋ถ€ํ•ด๋ณด๊ฒ ์Šต๋‹ˆ๋‹ค. ์„ธ ๋ฒˆ์งธ ์•„ํ‹ฐํด์€ ์ œ์–ด ํ๋ฆ„ ํ‰ํƒ„ํ™”(control flow flattening), API ๋ฆฌ์กธ๋น™, C2 IP ์ฃผ์†Œ ๋ณตํ˜ธํ™” ๊ณผ์ •์— ๋Œ€ํ•œ ๋‚ด์šฉ์ž…๋‹ˆ๋‹ค.  Malware Analysis Series (MAS) – Article 3 [Instruction]์šฐ์„  ์ง„ํ–‰ํ•˜๊ธฐ ์ „์—, ๊ฐ€์ƒ ๋จธ์‹ ์˜ ์Šค๋ƒ…์ƒท์„ ์ฐ๊ณ  ๋„คํŠธ์›Œํฌ ํ†ต์‹  ๋ฐ ๊ณต์œ  ํด๋”๋ฅผ ๊บผ๋‘๋Š” ๊ฒƒ์„ ์ถ”์ฒœํ•ฉ๋‹ˆ๋‹ค. ๋žœ์„ฌ์›จ์–ด๋ฅผ ๋‹ค๋ฃจ๋Š” ๊ฒƒ์€ ์•„๋‹ˆ์ง€๋งŒ ์•…์„ฑ์ฝ”๋“œ ์ƒ˜ํ”Œ์„ ๋ถ„์„ํ•  ๋•Œ ๊ฐ€์ƒ๋จธ์‹ ์ด ๋กœ์ปฌ ๋„คํŠธ์›Œํฌ์— ๋…ธ์ถœ๋˜์ง€ ์•Š๋„๋ก ํ•˜์„ธ์š”.์ €๋Š” ๋ถ„์„์„ ์ˆ˜ํ–‰ํ•˜๊ธฐ ์œ„ํ•ด REMnux์™€ Windows 8.1/10 (64.. 2025. 2. 17.
[Qakbot ๋ถ„์„ (5)] C2 ํ†ต์‹  ๊ณผ์ •๊ณผ ํƒ์ง€ ํšŒํ”ผ ๋ฐ ์ง€์†์„ฑ ํ™•๋ณด Qakbot ์•…์„ฑ์ฝ”๋“œ ๋ถ„์„ ๋งˆ์ง€๋ง‰ ํฌ์ŠคํŒ…์ž…๋‹ˆ๋‹ค.์ด๋ฒˆ ํฌ์ŠคํŒ…์—์„œ๋Š” ์•…์„ฑ์ฝ”๋“œ๊ฐ€ C2 ํ†ต์‹ ํ•˜๋Š” ๊ณผ์ •๊ณผ ํƒ์ง€ ํšŒํ”ผ ๋ฐ ์ง€์†์„ฑ์„ ํ™•๋ณดํ•˜๋Š” ๋ถ€๋ถ„์„ ๋ถ„์„ํ•ด๋ณด๊ฒ ์Šต๋‹ˆ๋‹ค.์ƒ˜ํ”Œ ํ•ด์‹œ(SHA256)๋Š” 73e4969db4253f9aeb2cbc7462376fb7e26cc4bb5bd23b82e2af0eaaf5ae66a8์ž…๋‹ˆ๋‹ค.   [๊ณต๊ฐœํ‚ค ๋ณตํ˜ธ]๋ถ„์„ ์ค‘ ์•…์„ฑ์ฝ”๋“œ๊ฐ€ Crypto API๋ฅผ ํ˜ธ์ถœํ•˜๋Š” ๋ถ€๋ถ„์„ ๋ฐœ๊ฒฌํ–ˆ์Šต๋‹ˆ๋‹ค.ํ•ด๋‹น ์„œ๋ธŒ๋ฃจํ‹ด์ธ sub_100084AF์— ๋“ค์–ด๊ฐ€๋ณด๊ฒ ์Šต๋‹ˆ๋‹ค. sub_100084AF ์„œ๋ธŒ๋ฃจํ‹ด ๋‚ด๋ถ€์—์„œ ์•”ํ˜ธ ๊ด€๋ จ API๋“ค์„ ํ˜ธ์ถœํ•˜๊ณ  ์žˆ์Šต๋‹ˆ๋‹ค. CryptDecodeObjectEx์ฃผ์–ด์ง„ ์ธ์ฝ”๋”ฉ๋œ ๋ฐ์ดํ„ฐ๋ฅผ ์ง€์ •๋œ ๊ตฌ์กฐ์ฒด ํ˜•์‹์œผ๋กœ ๋””์ฝ”๋”ฉํ•˜๋Š”๋ฐ ์‚ฌ์šฉCryptDecodeObjectEx ํ•จ์ˆ˜ ๊ตฌ์กฐBOOL CryptDecodeObjec.. 2025. 2. 14.
[Qakbot ๋ถ„์„ (4)] ๋ฆฌ์†Œ์Šค ๋ณตํ˜ธํ™” ๋ฃจํ‹ด ํŒŒ์•… ๋ฐ ์ •๋ณด ์ถ”์ถœ ์ง€๋‚œ ํฌ์ŠคํŒ…์— ์ด์–ด Qakbot ์•…์„ฑ์ฝ”๋“œ๋ฅผ ๋ถ„์„ํ•ด๋ณด๊ฒ ์Šต๋‹ˆ๋‹ค. ์ด๋ฒˆ ํฌ์ŠคํŒ…์—์„œ๋Š” ์•…์„ฑ์ฝ”๋“œ์˜ ๋ฆฌ์†Œ์Šค ๋ณตํ˜ธํ™” ๋ฃจํ‹ด์„ ํŒŒ์•…ํ•˜๊ณ  ์Šคํฌ๋ฆฝํŠธ๋ฅผ ์ž‘์„ฑํ•˜์—ฌ ํ•ด๋‹น ๋ฆฌ์†Œ์Šค์—์„œ ์–ด๋–ค ์ •๋ณด๋ฅผ ์ถ”์ถœํ•  ์ˆ˜ ์žˆ๋Š”์ง€ ํ™•์ธํ•ด๋ณด๊ฒ ์Šต๋‹ˆ๋‹ค.์ƒ˜ํ”Œ ํ•ด์‹œ(SHA256)๋Š” 73e4969db4253f9aeb2cbc7462376fb7e26cc4bb5bd23b82e2af0eaaf5ae66a8์ž…๋‹ˆ๋‹ค.   ๊ณ„์† ๋ถ„์„ํ•˜๊ธฐ ์œ„ํ•ด sub_1000FB74 ์„œ๋ธŒ๋ฃจํ‹ด์„ ์‚ดํŽด๋ณด๊ฒ ์Šต๋‹ˆ๋‹ค.๋ฌธ์ž์—ด ํ…Œ์ด๋ธ” ๋””์ฝ”๋”(mw_decode_string_table_2)๋ฅผ ํ˜ธ์ถœํ•˜๋Š” ๊ฒƒ์„ ๋ฐœ๊ฒฌํ•˜์˜€์Šต๋‹ˆ๋‹ค. ์ง€๋‚œ๋ฒˆ ์ž‘์„ฑํ•œ IDA Python ์Šคํฌ๋ฆฝํŠธ๋ฅผ ์ด์šฉํ•˜์—ฌ ๋ฌธ์ž์—ด์„ ๋ณตํ˜ธํ™”ํ•˜์—ฌ ์ฃผ์„์œผ๋กœ ์ถ”๊ฐ€ํ•ด์ฃผ๊ฒ ์Šต๋‹ˆ๋‹ค.(์Šคํฌ๋ฆฝํŠธ ๋‚ด์šฉ์€ '๋ฐ”์ด๋„ˆ๋ฆฌ์—์„œ ์•”ํ˜ธํ™”๋œ ๋ฌธ์ž์—ด ์ถ”์ถœ(๋ณตํ˜ธํ™”)ํ•˜๊ธฐ'์— ์ž์„ธํžˆ ์„ค๋ช…๋˜์–ด ์žˆ์Šต.. 2025. 2. 12.
[Qakbot ๋ถ„์„ (3)] ์ค‘์ฒฉ ๊ตฌ์กฐ์ฒด/์—ด๊ฑฐํ˜•(enum) ์ƒ์„ฑ ๋ฐ mersenne twister ์ง€๋‚œ ํฌ์ŠคํŒ…์— ์ด์–ด Qakbot ์•…์„ฑ์ฝ”๋“œ๋ฅผ ๋ถ„์„ํ•ด๋ณด๊ฒ ์Šต๋‹ˆ๋‹ค.์ด๋ฒˆ ํฌ์ŠคํŒ…์—์„œ๋Š” ์ค‘์ฒฉ ๊ตฌ์กฐ์ฒด์™€ ์—ด๊ฑฐํ˜•(Enum)์„ ์ถ”๊ฐ€ํ•˜๊ณ , mersenne twister์— ๋Œ€ํ•ด ์•Œ์•„๋ณด๊ฒ ์Šต๋‹ˆ๋‹ค.์ƒ˜ํ”Œ ํ•ด์‹œ(SHA256)๋Š” 73e4969db4253f9aeb2cbc7462376fb7e26cc4bb5bd23b82e2af0eaaf5ae66a8์ž…๋‹ˆ๋‹ค.   [๊ตฌ์กฐ์ฒด ์ƒ์„ฑ]์ง€๋‚œ๋ฒˆ mw_iat_construction(sub_1000606C)๊นŒ์ง€ ๋ถ„์„์„ ์™„๋ฃŒํ•˜์˜€์Šต๋‹ˆ๋‹ค. mw_iat_construction ์„œ๋ธŒ๋ฃจํ‹ด์€ ์„ธ ๋ฒˆ ํ˜ธ์ถœ๋˜๋Š”๋ฐ ๊ทธ ์ค‘ sub_10005FBC๋ฅผ ์‚ดํŽด๋ณด๊ฒ ์Šต๋‹ˆ๋‹ค.  sub_10005FBC  sub_10005FBC ์„œ๋ธŒ๋ฃจํ‹ด ๋‚ด๋ถ€ 8๋ฒˆ์งธ ์ค„์˜ sub_10000D1C9์— ๋จผ์ € ๋“ค์–ด๊ฐ€๋ณด๊ฒ ์Šต๋‹ˆ๋‹ค.  sub_10000D1C9 ์„œ๋ธŒ๋ฃจํ‹ด์€.. 2025. 2. 10.
๋ฐ”์ด๋„ˆ๋ฆฌ์—์„œ ์•”ํ˜ธํ™”๋œ ๋ฌธ์ž์—ด ์ถ”์ถœ(๋ณตํ˜ธํ™”)ํ•˜๊ธฐ ์•…์„ฑ์ฝ”๋“œ๋Š” ํ”ํžˆ XOR ์—ฐ์‚ฐ์„ ํ†ตํ•ด ๋‚œ๋…ํ™”ํ•˜๊ณ  ๋‚ด๋ถ€ ๋ฐ์ดํ„ฐ๋ฅผ ์ˆจ๊น๋‹ˆ๋‹ค.์ด๋ฅผ ๋ณตํ˜ธํ™”ํ•˜๋Š” python ์Šคํฌ๋ฆฝํŠธ์— ๋Œ€ํ•ด ๊ณต๋ถ€ํ•ด๋ณด๊ฒ ์Šต๋‹ˆ๋‹ค. (์Šคํฌ๋ฆฝํŠธ๋Š” ๋ชจ๋‘ Alexandre Borges์˜ "Malware Analysis Series(MAS) – Article 2"๋ฅผ ์ฐธ์กฐํ•˜์˜€์Šต๋‹ˆ๋‹ค.) ์ƒ˜ํ”Œ ํ•ด์‹œ(SHA256)๋Š” 73e4969db4253f9aeb2cbc7462376fb7e26cc4bb5bd23b82e2af0eaaf5ae66a8์ž…๋‹ˆ๋‹ค.ํ•ด๋‹น ์ƒ˜ํ”Œ์€ Qakbot ์•…์„ฑ์ฝ”๋“œ๋กœ ์–ธํŒจํ‚นํ•œ ํ›„ ์ง„ํ–‰ํ•˜์˜€์Šต๋‹ˆ๋‹ค.  ๋จผ์ € ์•…์„ฑ์ฝ”๋“œ์˜ ์ž์ฒด ๋ณตํ˜ธํ™” ํ•จ์ˆ˜๋ฅผ ์‚ดํŽด๋ณด๊ฒ ์Šต๋‹ˆ๋‹ค.๋ณตํ˜ธํ™” ๋ฃจํ‹ด sub_100085dC๋ฅผ ๋ณด๋ฉด, ๋‘ ๋ฒˆ์งธ ์ธ์ˆ˜๋Š” ์•”ํ˜ธํ™”๋œ ๋ฌธ์ž์—ด๋กœ 0x1001D5A8์— ์žˆ๊ณ  ์ƒˆ ๋ฒˆ์งธ ์ธ์ˆ˜์ธ ๋ณตํ˜ธํ™” ํ‚ค๋Š” ์ฃผ์†Œ 0x1001E3F8์— ์žˆ์Šต๋‹ˆ๋‹ค.. 2025. 2. 6.
[Qakbot ๋ถ„์„ (2)] PE ํฌ๋งท ์กฐ์ž‘ ๋ฐ API ๋ฆฌ์กธ๋น™ ์ง€๋‚œ ํฌ์ŠคํŒ…์—์„œ ์–ธํŒจํ‚นํ•œ Qakbot ์•…์„ฑ์ฝ”๋“œ๋ฅผ ์ด์–ด์„œ ๋ถ„์„ํ•ด๋ณด๊ฒ ์Šต๋‹ˆ๋‹ค.์ด๋ฒˆ ํฌ์ŠคํŒ…์—์„œ๋Š” PE ํฌ๋งท๊ณผ API ๋ฆฌ์กธ๋น™์— ๋Œ€ํ•ด ์•Œ์•„๋ณด๊ฒ ์Šต๋‹ˆ๋‹ค.์ƒ˜ํ”Œ ํ•ด์‹œ(SHA256)๋Š” 73e4969db4253f9aeb2cbc7462376fb7e26cc4bb5bd23b82e2af0eaaf5ae66a8์ž…๋‹ˆ๋‹ค.   [ Capa๋ฅผ ํ†ตํ•ด ์Šค์บ” ]๋จผ์ € ์–ธํŒจํ‚นํ•œ DLL์„ Capa๋กœ ํ™•์ธํ•ด๋ณด๊ฒ ์Šต๋‹ˆ๋‹ค.Capa๋Š” PE, ELF, .NET, shellcode ๊ฐ™์€ ์‹คํ–‰ํŒŒ์ผ์ด๋‚˜ ์ƒŒ๋“œ๋ฐ•์Šค ๋ณด๊ณ ์„œ๋ฅผ ์ž…๋ ฅํ•˜๋ฉด, ํ•ด๋‹น ํŒŒ์ผ์˜ ๊ธฐ๋Šฅ์„ ํƒ์ง€ํ•˜์—ฌ ์ถœ๋ ฅํ•ด์ฃผ๋Š” ๋„๊ตฌ์ž…๋‹ˆ๋‹ค. IDA plugin์œผ๋กœ ์—ฐ๋™ํ•˜์—ฌ ์‚ฌ์šฉํ•  ์ˆ˜๋„ ์žˆ์Šต๋‹ˆ๋‹ค(Capa Explorer). ์•„๋ž˜๋Š” Capa๋ฅผ ํ†ตํ•ด ์–ธํŒจํ‚น๋œ DLL์„ ๊ฒ€์‚ฌํ•˜์—ฌ ์ถœ๋ ฅํ•œ ๋‚ด์šฉ์ž…๋‹ˆ๋‹ค. Capa๋ฅผ ํ†ตํ•ด ์–ป์€ ์•…์„ฑ์ฝ”๋“œ ๋ถ„์„์— .. 2025. 2. 4.
[Qakbot ๋ถ„์„ (1)] ์–ธํŒจํ‚น(Unpacking) - ๋งคํ•‘๊ณผ ์–ธ๋งคํ•‘(Mapping&Unmapping) Qakbot ์•…์„ฑ์ฝ”๋“œ๋ฅผ ์ฐจ๊ทผ์ฐจ๊ทผ ๋ถ„์„ํ•ด๋ณด๊ฒ ์Šต๋‹ˆ๋‹ค.์ด๋ฒˆ ํฌ์ŠคํŒ…์—์„œ๋Š” ํŒจํ‚น๋˜์–ด ์žˆ๋Š” ํŒŒ์ผ์„ ์–ธํŒจํ‚นํ•˜๊ณ , ์–ธ๋งคํ•‘๋œ ํ˜•์‹๊ณผ ๋งคํ•‘๋œ ํ˜•์‹์— ๋Œ€ํ•ด ์•Œ์•„๋ณด๊ฒ ์Šต๋‹ˆ๋‹ค.์ƒ˜ํ”Œ ํ•ด์‹œ(SHA256)๋Š” 73e4969db4253f9aeb2cbc7462376fb7e26cc4bb5bd23b82e2af0eaaf5ae66a8์ž…๋‹ˆ๋‹ค.  [ํŒŒ์ผ ์ •๋ณด ๋ถ„์„ ๋ฐ ์ถ”์ถœ]VirusTotal์—์„œ ํ™•์ธํ•ด๋ณด๋ฉด ๋‹ค์Œ๊ณผ ๊ฐ™์€ ์ •๋ณด๋ฅผ ์–ป์„ ์ˆ˜ ์žˆ์Šต๋‹ˆ๋‹ค.์˜ค๋ฒ„๋ ˆ์ด(overlay)๋ฅผ ๊ฐ€์ง€๊ณ  ์žˆ์Šต๋‹ˆ๋‹ค.Qakbot ์•…์„ฑ์ฝ”๋“œ์ž…๋‹ˆ๋‹ค.์ด์ƒํ•œ ์ด๋ฆ„์˜ ์„น์…˜์ด ์žˆ์Šต๋‹ˆ๋‹ค.์•„๋งˆ ํŒจํ‚น๋œ ๊ฒƒ ๊ฐ™์Šต๋‹ˆ๋‹ค.  DIE๋กœ ํ™•์ธํ•˜๋ฉด ์ด ์ƒ˜ํ”Œ์ด Borland Delphi๋กœ ์ปดํŒŒ์ผ๋˜์—ˆ๋‹ค๋Š” ๊ฒƒ์„ ์•Œ ์ˆ˜ ์žˆ์Šต๋‹ˆ๋‹ค. PE-bear๋กœ ํ™•์ธํ•ด๋ณด๋ฉด export ํ•จ์ˆ˜๊ฐ€ ํ•˜๋‚˜(DLLRegistreServer)๋งŒ .. 2025. 1. 17.
Malware Analysis Series (MAS) – Article 2 Alexandre Borges์˜ ๋ธ”๋กœ๊ทธ Exploit Reversing์˜ ์•…์„ฑ์ฝ”๋“œ ๋ถ„์„ ์‹œ๋ฆฌ์ฆˆ 'Malware Analysis Series(MAS)'๋ฅผ ๋ฆฌ๋ทฐํ•˜๋ฉฐ ๊ณต๋ถ€ํ•ด๋ณด๊ฒ ์Šต๋‹ˆ๋‹ค. ๋‘ ๋ฒˆ์งธ ์•„ํ‹ฐํด์€ API ๋ฆฌ์กธ๋น™, C++ ๊ตฌ์กฐ์ฒด์— ๋Œ€ํ•œ ๋‚ด์šฉ์ž…๋‹ˆ๋‹ค.  Malware Analysis Series (MAS) – Article 2 [Instruction]์ด๋ฒˆ ์•„ํ‹ฐํด์—์„œ๋Š” ๊ฐ„๋‹จํ•œ ์•…์„ฑ์ฝ”๋“œ Qakbot์„ ๋ถ„์„ํ•˜๋ฉฐ ๋ฌธ์ž์—ด ๋ณตํ˜ธํ™”, API ๋ฆฌ์กธ๋น™, C++ ๊ตฌ์กฐ์ฒด ๊ทธ๋ฆฌ๊ณ  C2 ๋ฐ์ดํ„ฐ ์ถ”์ถœ์— ๋Œ€ํ•ด ์„ค๋ช…ํ•ด๋ณด๊ฒ ์Šต๋‹ˆ๋‹ค. ์š”์ฆ˜์—๋Š” ํŒจํ‚น๋˜์ง€ ์•Š์€ ์•…์„ฑ์ฝ”๋“œ๊ฐ€ ๊ฝค ๋“œ๋ฌผ๊ธฐ ๋•Œ๋ฌธ์— ๋„ค์ดํ‹ฐ๋ธŒ(native) ์ฝ”๋“œ๋ฅผ ์–ธํŒจํ‚นํ•  ๋•Œ breakpoint๋ฅผ ์„ค์ •ํ•ด์•ผํ•  API์— ๋Œ€ํ•ด ์•Œ์•„๋‘๋Š” ๊ฒƒ์ด ์ข‹์Šต๋‹ˆ๋‹ค. API ๋ชฉ๋ก์€ ์•„๋ž˜์™€ ๊ฐ™์Šต๋‹ˆ๋‹ค.CreatePr.. 2025. 1. 16.