VB2017 preview: Crypton – exposing malware’s deepest secrets

Ask a programmer to perform the same task twice and they will write a tool that automates it. Malware analysts are no different, and the Virus Bulletin Conference has a long history of including papers on tools and tricks that make the task of analysing malware a lot easier.

‘Crypton’ is such a tool. It was developed by

F5 Networks

researchers Julia Karpin and Anna Dorfman to speed up the reverse engineering process by decrypting encrypted content found in a (malicious) binary. Given that malware authors tend to take the ‘encrypt everything’ mantra to the extreme, this tool could save a lot of time.

However, the

paper

, which the researchers will present at VB2017, isn’t just about ‘yet another tool’. It actually describes the process Julia and Anna went through in designing and building it. For fellow researchers attending the conference, this is probably even more interesting than the end result.

aesdisassembled_karpindorfman.png

Part of the disassembled code of the AES algorithm, found as such in many a malware sample.

To learn from Julia and Anna’s work, and to see more than 50 other speakers in Madrid next month, don’t forget to

register

for VB2017 – and don’t forget that there are special

discounted tickets

available for students!


VB2017-325w.jpg

Comments

Leave a Reply

Your email address will not be published. Required fields are marked *