In July, the large service providers in Vietnam (name is deducted due to privacy reason) were attacked, which has been causing serious consequences. At the time, we found a very new malware sample and selected it to analyze and publish this report to aware the community. Continue reading
It was a Friday of last May. A client pulled me from the air conditioner to meet him. His department took over the website’s company from another team. His company is service provider and the website is a portal that is serving over 1 million customers natonalwide. Through the portal, user can view their spend . And he needs the support from us to penetrate the security matters of the portal: finding the security weakness, showoff the data leakage if any and suggest the solution.
(English caption below)
Q: Gần đây tôi nghe nhiều người nhắc tới thuật ngữ Pentest, kiểm thử bảo mật, thuật ngữ đó nghĩa là gì vậy chị?
A: Pentest là hoạt động đánh giá sức khỏe của hệ thống thông tin dựa trên kỹ thuật thử nghiệm tấn công hệ thống. Hệ thống có thể hiểu là website, máy chủ, mạng,… và thậm chí cả con người. Continue reading
A fake email attached a document containing code to exploit the vulnerability software (MIME-version: 1.0). This document used CVE-2012-0158 to install malware into a computer.
Shellcode analysis is not trivial. Static analysis is ineffective and easily to be defeated. Moreover, static analysis tools are usually not free. Dynamic analysis requires the shellcode to be loaded into another process in an appropriate environment, which is often a virtual machine.
In this presentation we introduce PyAna, a new tool that aims to make it easier to analyze shellcode. PyAna uses the Unicorn framework to emulate CPU, and creates a virtual Windows process, into which the shellcode is injected and analyzed. This allows automating the analysis, and provides a flexible and light-weight environment without requiring virtual machines.
The malware, designed by human, often inhabits the servers to steal the information and to destroy the computer systems.
This analysis aims to find out, in the case of the company (real name is not exposed by the permission), how the malware infected the server, and to assess the malware’s relationship with external objects.
The same as the shellcode, Dropper also used a decryption function to transform themselves by XOR with 0xCC value. Then, it was parsing kernel32.dll and getting the addresses of APIs.
We have reported about a vulnerability relating to Microsoft Word application and called as CVE-2012-0158. You can refer to here.  According to the result on Virus Total, we analyze a malware relating the CVE-2012-0158 vulnerability.Last month, I paid much attention to the following email: