SP23 - CMSC 449 Malware Midterm
.docx
keyboard_arrow_up
School
University of Maryland, Baltimore County *
*We aren’t endorsed by this school
Course
449
Subject
Information Systems
Date
Apr 3, 2024
Type
docx
Pages
5
Uploaded by GrandTank13346
CMSC 449 Spring 2023 Malware Analysis Midterm
Name: Assigned: Wednesday 3/29/2023
Due: Wednesday 4/5/2023 by 5:30pm
Do not
discuss this midterm with other students; absolutely NO
collaboration is allowed. You may use any of the resources and tools discussed in class to answer the questions. You may ask the TAs or me clarification questions.
Please provide supporting evidence for your answers. Even though not all questions ask for screenshots, you are always free to do so. For this midterm you should to work on the Windows 7 version of the Flare VM to guarantee that the midterm malware is 100% functional. That VM can be downloaded from the course website. Download and extract the malware onto your Flare VM. The password to the zip file is “infected”. The zip file contains midterm.exe, which is a live malware sample.
Submit your completed exam as a DOCX file (not PDF) using Blackboard as usual. Part 1: Basic Static Analysis (30 pts)
1) Is this midterm.exe packed? List 3 features of the file that indicate whether it is or is not packed. If the
malware is packed, be sure to also include information about the type of packer used and how did you determine that (10 pts)
a) b) c) What type of packer was used? How do you know?
2) Unpack midterm.exe. What command did you use to unpack it? What are the SHA-1 and MD5 hashes of the packed and unpacked files? (8 pts) MD5 of midterm.exe before unpacking: MD5 of midterm.exe after unpacking: SHA-1 of midterm.exe before unpacking: SHA-1 of midterm.exe after unpacking: 3) Investigate the strings of the unpacked midterm.exe. Select three strings you believe are suspicious. For each one, describe how you found it, and why you think it’s suspicious. (12 pts)
String 1) (2 points) String 2) (2 points) String 3) (2 points) Based on your analysis, what type of malware is this, and what does it do? (6 points)
Part 2: Basic Dynamic Analysis (30 pts)
Follow the FakeNet-NG guide to configure the network settings of your Flare VM. You should only run the malware while your VM is not connected to the internet! Run midterm.exe and answer questions 4-
6. You can run either the packed or unpacked version of the malware.
4) What port does midterm.exe listen on? How did you find this information? (6 pts) The malware starts a telnet server which listens on the port you found in question 4. A malware actor can connect to this port remotely and interact with the malware. While midterm.exe is running, open a command prompt on your VM and run the following command:
nc 127.0.0.1 [port number from question 4]
5) Once you have run the nc command, type “?” to list the different commands that the midterm.exe can execute. (10 pts total)
What does this list of commands tell you about this malware? (2 pts)? Provide a screenshot of your command prompt window, showing the list of commands below (2pts):
Pick two of the commands to explore and describe in detail what they do.
Command 1:(3 points) Command 2: (3 points) 6) The malware will install itself if provided with the “i” command. Using a dynamic analysis tool, investigate how the malware makes itself persistent. For the questions below, be specific and describe how you found this information. (10 pts total)
What is the malware sample’s persistence mechanism? (4 pts): What is the path of the persistence mechanism that allows the malware to stay persistent [Hint: The path here is not a traditional directory path. It's something that is similar to a directory path] (3 pts)?
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help