VMRay automated malware analysis for CERTs

CERTs have to provide their constituency early warnings and alerts about new threats.

A typical example is a new form of malware being distributed by e-mail. It takes a while before anti-virus vendors include the new signature to recognise the malware. This means that there’s a time window where the malware is not filtered and users in your constituency can get infected.

To protect your constituency you can provide them your own signature with indicatorsRead more.

Getting started with MISP, Malware Information Sharing Platform & Threat Sharing – part 2

My first post on MISP described how to get MISP installed and get it up and running. This post describes how you can use MISP to your benefit to share threat information with your community.

The basic features of MISP are described in detail in the documentation at INSTALL/documentation.pdf. I’ll describe the steps needed to create an event and add some useful data.

You can add an event under Event actions, Add event. You’ll haveRead more.

Getting started with MISP, Malware Information Sharing Platform & Threat Sharing – part 1

MISP or Malware Information Sharing Platform & Threat Sharing is an open source tool for sharing malware and threat information with the security community. It is available on Github and is used by a large number of CERTs and security teams.

This first post describes how to get MISP installed and get it up and running. The next post describes how you can use MISP to your benefit to share threat information with yourRead more.

Security conferences for CERTs in Europe

Computer security conferences are a great opportunity to exchange information with your peers and learn about new trends in the industry.

This is an overview of European security conferences and trainings that can be of use for CERTs. Note: Spending May in Amsterdam is a good idea!

NCSC One Conference  April, 13-14, 2015 The Hague, The Netherlands Global Conference on CyberSpace 2015  April, 16-17, 2015 The Hague, The Netherlands Cyber Security Summit Industry&Gov  April, 14-15,Read more.

Use CryptoLocker to train your incident response team (part 3)

This is the third part in a post describing how to train your team for incident response and incident investigations.

The first part for training incident response and incident investigations covered how to analyze the e-mail headers and information in a suspicious e-mail. The second part analyzed the attachment which turned out to be a CryptoLocker.F variant.

The last step of my analysis involved executing the CryptoLocker virus in a fully networked VM. After resettingRead more.

Use CryptoLocker to train your incident response team (part 2)

This is the second part in a post describing how to train your team for incident response and incident investigations.

The first part covered how to analyze the e-mail headers and information in a suspicious e-mail.

The e-mail contained one attachment : koen.vanimpe@c.d.zip. Unzipping the file resulted in a .scr file.

The sha1 is

MD5 is

I uploaded the scr file to Virustotal for further analysis. So far (22-Feb) no-one else submitted a similar sample.Read more.

Use CryptoLocker to train your incident response team (part 1)

An incident response and incident investigation team needs to be able to quickly extract useful information from an incident. Instead of writing long theoretical documents I wanted to use the hands-on approach to serve as an example to train a team to quickly extract IOCs from an ongoing incident. What’s better for doing this than to analyze the behavior of CryptoLocker to train an incident response team and analyze the delivery of CryptoLocker?

IOCs orRead more.

Pipal analyses Ten Million Passwords

Mark Burnett recently released a set of passwords with an announcement on his blog in the post Today I Am Releasing Ten Million Passwords.

I used Pipal in the past to analyze WordPress login attempts so I decided to run it against this set.

It is no surprise to see that the top password is 123456. The top two words used to build passwords are password and qwerty.

The average password length is betweenRead more.

TrueCrypt alternatives for Windows, Encrypted Container Systems

A colleague recently asked me “what encryption solution should I now use instead of TrueCrypt?”. After a couple of questions back-and-forth we defined the request to :

have a simple to use, reliable encryption system for individual containers on Windows platforms in a corporate environment

The containers have to be easy shareable with multiple users, preferably via a cloud storage provider.

Typically users share encrypted containers by emailing them or copying them to removableRead more.

Bind DNS Sinkhole, Elasticsearch and Logstash

I wanted to track DNS queries that get send to nameservers that do not serve a particular domain or network. I used a Bind DNS server that logged the query and returned a fixed response. The logs get parsed by Logstash and stored in Elasticsearch for analysis.

Installing bind is easy via the bind9 package :

This will add a new user ‘bind’ and store the configuration files in /etc/bind.

For this setup IRead more.