-
Notifications
You must be signed in to change notification settings - Fork 1.2k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
New hostnames / usernames checked for by malware #227
Comments
These are far too likely to cause false positives for my liking. Checking if "sandbox" is in the computer name is reasonable, though. |
Assuming most people use al-khaser to assess ways in which their malware analysis environment might be susceptible to detection, it seems like it'd be useful for them to be made aware if their environment is using one of these generic user names or host names. It's likely that most or all of these hostnames/usernames are ones that the malware author observed and determined to likely be sandbox-related, and assuming that's correct, it would be especially useful for those sandbox maintainers to be alerted to this if they happened to run al-khaser. For example, ABBY-PC is likely related to this finding, from Empirical Study to Fingerprint Public Malware |
I think I'd be more inclined to agree if we had strong empirical data on the matter. I'm unconvinced that the research paper offers any real value in that regard:
TL;DR - the paper is massively flawed. I agree on your point about al-khaser's use-case for assessing malware analysis environments, but I'm not sure that we want to include a particularly weak and false-positive heavy check just because one RAT happened to use it once, and especially not when it appears to have been based on one single artifact distribution from a not-very-good paper. We also have to consider temporality in this situation - anything that becomes widely known to be a sandbox username is likely to be changed within a matter of months, leading to a constant expansion of the "known" sandbox names until the defenders end up randomising usernames or the heuristic becomes so bloated that its false positive rate outweighs its true positive rate. All that said, I'm absolutely not against a more generic set of "soft heuristics" that might potentially indicate an analysis environment. From a UX perspective it'd have to be clearly labelled as something that is only weakly correlated and liable to cause false positives. |
Great points regarding the paper. This OSTap behavior is relatively new AFAIK, so it seems plausible to me that a sandbox still uses 'abby' as the username. Assuming that's true, given that knowledge of this username being associated with sandboxes has been out for 4 years then maybe it's also an indication that the ones managing this sandbox are unlikely to run al-khaser there to learn of this deficiency even if the functionality was implemented. x_x Regarding the arms race, I go back and forth on it... Adding this type of information in a centralized place like al-khaser does mean that attackers have to do less work to find ways of detecting sandboxes, so more actors might start leveraging these techniques. On the other hand, it is difficult for defenders to track all the one-off techniques that individual actors are using, and by aggregating information that's already been published on it makes it easier for defenders to identify deficiencies in their environment. Regardless, I agree that it has the potential to speed up the "churn" of sandbox usernames. I think defenders have a decent move, though - use a username like 'Administrator' or maybe randomly cycle through a list of extremely common usernames so that malware would become much less reliable if it chose to not infect machines based on that heuristic. I like the "soft heuristics" idea - that's probably a good way to balance any concerns. |
New hostname / username that we could add to the
known_usernames
andknown_hostnames
checks:Hostnames checked for by OSTap [1]
Usernames checked for by OSTap [1]
[1] https://twitter.com/GossiTheDog/status/1357019072534355970 (or see https://gist.github.com/kirk-sayre-work/82cdc8f8faba929259bacb8ecea22162)
From ObliqueRAT [2], blocklisted keywords for username and computer name:
[2] https://blog.talosintelligence.com/2021/02/obliquerat-new-campaign.html
The text was updated successfully, but these errors were encountered: