Rootkits
IoT Malware
ICS Malware
Trojan
Ransomware
Mobile Malware
Virus
Worm
Exploit Kits
encryption이랑 decryption은 기본 inverse로 private key와 중간의 generator key를 안다는 가정하에 그냥 풀림
Oligomorphism & Polymorphism
Oligomorphism → n possible way of decrypts , it means that thousand of sample might introduce the detection of virus.
Polymorphism → Whenever create in the machine and recreate or change the file code, the whole system just becomes totally different one. It allows hard to detect the virus.
Metamorphism
Different body shapes, Pattern detection X work
Heuristic detection or algorithm detection
Rootkit
Embedded system and keep the stealthy of malware code that can easily track for user to investigate which command or which files are running right now.
1) (Intercept any function call) → Main function of Rootkit.
2) With the true and false based function call, detect whether the user might recognize the malware code file or not. If yes, the Rootkit intercepts the result of function call and hide it. (Rootkit fileter가 하는 역할)
Fileless Malware
residues in memory during the execution cycle without nay footprint int he file system. (Increase the stealthy)
Large-Scale Software development model
Plugin-based framework, unique functionality of plugin provides the password stealing and stealthy with long persistence.
Example) RAT(Remote Access Trojan)
(Infiltraiton methods) Pop-up system, Email
It works as the other system files and it is hard to detect it by using the memory-usage detection model, memory traffic detection model. (Remote control of access needs the large amount of data transfer that is recognized as an abnormal action)

| Name of Phase | Functionality | Example |
|---|---|---|
| Reconnaissance (정찰) | Familarize before the invasion of system | Social engineering, Passive reconnaissance, and meta-data monitoring |
| Name of Phase | Functionality | Example |
|---|---|---|
| Weaponization | create target specific malware | Exploit Component (Zero-day exploit, N-day exploit) , Payload Component (APT payloads); Stealth modules |
| Name of Phase | Functionality | Example |
|---|---|---|
| Delivery | delivers the weapon to target environment | Spear Phishing, Watering hole attack, Removable Media |
| Name of Phase | Functionality |
|---|---|
| Establish Foothold | maintain persistence with payload, increase the access level of network |
| Name of Phase | Functionality | Example |
|---|---|---|
| Command & Control | Communication channels, C&C server | DNS as C2, FFSN, Covert Channels |
| Name of Phase | Functionality |
|---|---|
| Lateral Movement | maintain long-term access to the infrastrucutre(APT objective) |
| Name of Phase | Functionality |
|---|---|
| Accomplishing Goal | Data Exfiltration, Data destruction/ manipulation |
SSL protocol (Secure Socket Layer)
client-server handshake , key exchange of encryption RSA ecnrytion scheme.
Collision problem from the hashing function of same encryption key.
TLS protocol (Transport Layer Security)
client-server handshake , key exchange of encryption RSA ecnrytion scheme.
Collision Resistant
| Hacker Group Name | Group Explanation |
|---|---|
| APT38-Lazarus Group | North Korea |
| APT41- Double Dragon Group | China |
| Hidden Lynx | considered to be a China-based threat actor |
| WaterBug-Symantec | a notorious espionage group expert in conducting watering hole and spearphishing campaigns |
| APT 28 | attributed to Russian and is responsible for interfering with the United States presidential election |
| Oilrig-Palo Alto | attributed to Iran state-sponsored group, leveraged the trust relationship between organizations and performed supply chain attacks on their primary targets |
| Transparent Tribe-Proofpoint | Pakistan, maliciuos spearphishing email and Remote Access Trojan (RAT) |
| Ke3chang -FireEye | North Korea |
| APT38-Lazarus Group | suspect as a China group |
| BlackOasis-Kaspersky | Middle Eastern, Gamma Group is the client of hacking |
| FIN6-FireEye | stealing payment card data and POS system, trade on the dark web |
| Tick-Symantec | spearphishing emails |
| APT1 | China |
| Sandworm Team-Trend | a Russian cyberespionage group, sabotage and destruction |
1) Static Analysis
2) Dynamic Analysis
3) Hybrid
1) Memory Forensics
1) Negative Day Malware Alert
Signature based detection
1) Dyanamic , collect the information and exhibits the program's behavioral pattern
2) Static , PUI to IR and compare PUI and CFG. If both have common def, it is malicious, if not normal.
3) Hybrid
Behavior based detection (Anomaly detectors)
1) Anomaly based detection