• DocumentCode
    3348987
  • Title

    Malware authors don´t learn, and that´s good!

  • Author

    Calvet, Joan ; Davis, Carlton R. ; Bureau, Pierre-Marc

  • Author_Institution
    Ecole Polytech. de Montreal, Montreal, QC, Canada
  • fYear
    2009
  • fDate
    13-14 Oct. 2009
  • Firstpage
    88
  • Lastpage
    97
  • Abstract
    The Waledac malware first appeared in November 2008, shortly after the Storm botnet became inactive. This malware is currently quite prominent and active. Its main propagation mechanism is via social engineering schemes which entice or trick users into downloading and executing the malware binaries. The Waledac malware differs significantly from the Storm malware. For example, unlike Storm, Waledac utilises strong cryptographic algorithms, such as AES and RSA with 128 and 1024-bit keys, respectively. There are however a number of design and implementation errors and weaknesses in the malware which makes it relatively easy to intercept, analyse and modify and even to replay Waledac´s communication traffic. Interestingly, some of these design and implementation errors and weaknesses were also present in the Storm malware. In this paper, we present the results of our analysis on Waledac. To facilitate our analysis, we captured several versions of the malware binaries and reverse engineered them. We also executed the binaries in secure environments and observed their communication traffic. Our analysis provides valuable insights into the inner working of Waledac malware and the botnet it constitutes. In addition to giving details of the mode of operation of Waledac, we highlight some of the weakness of Waledac, outline some of the differences and similarities between Waledac and Storm, and suggest means by which Waledac botnet can be infiltrated and disrupted.
  • Keywords
    cryptography; invasive software; AES; RSA; Storm botnet; Storm malware; Waledac malware; cryptographic algorithms; malware authors; social engineering schemes; Cryptography; Internet; Packaging; Protection; Reverse engineering; Security; Software packages; Software testing; Storms;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Malicious and Unwanted Software (MALWARE), 2009 4th International Conference on
  • Conference_Location
    Montreal, QC
  • Print_ISBN
    978-1-4244-5786-1
  • Type

    conf

  • DOI
    10.1109/MALWARE.2009.5403013
  • Filename
    5403013