ZeuS v2 Malware Analysis - Part II

From Botnets.fr
Jump to navigation Jump to search

(Publication) Google search: [1]

ZeuS v2 Malware Analysis - Part II
Botnet
Malware Zbot
Botnet/malware group
Exploit kits
Services
Feature
Distribution vector
Target
Origin
Campaign
Operation/Working group
Vulnerability
CCProtocol
Date 2012 /
Editor/Conference System Forensics
Link http://www.sysforensics.org/2012/04/zeus-v2-malware-analysis-part-ii.html www.sysforensics.org (www.sysforensics.org Archive copy)
Author Patrick Olsen
Type

Abstract

ZeuS v2 Malware Analysis - Part II

Welcome back for Part II. I am going to be taking a look at memory forensics by way of Volatility.

Memory Forensics

Let's kick this section off by running the volatility command, "imageinfo". The imageinfo command does just that. It provides us the image information required so we can specify what profile to pass to volatility when we start running more commands against our image.

In our case this is what the results looked like:


So now we know that we are running Windows 7 Service Pack 1 on an x86 platform, which is correct. So when we run future commands we will specify --profile=Win7SP1x86.

When I am running volatility I will typically run pslist first. Let's do that and see what we can find.

Bibtex

 @misc{Lua error: Cannot create process: proc_open(/dev/null): failed to open stream: Operation not permitted2012BFR984,
   editor = {System Forensics},
   author = {Patrick Olsen},
   title = {ZeuS v2 Malware Analysis - Part II},
   date = {26},
   month = Apr,
   year = {2012},
   howpublished = {\url{http://www.sysforensics.org/2012/04/zeus-v2-malware-analysis-part-ii.html www.sysforensics.org}},
 }