{"id":432,"date":"2025-04-27T20:45:32","date_gmt":"2025-04-27T20:45:32","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/jb23435\/?page_id=432"},"modified":"2025-04-27T21:00:11","modified_gmt":"2025-04-27T21:00:11","slug":"malware-analysis","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/jb23435\/malware-analysis\/","title":{"rendered":"Malware Analysis"},"content":{"rendered":"\n<p>Task-1: Go to https:\/\/bazaar.abuse.ch\/browse\/ and select a malware with the \u201cMirai\u201d signature.<br>Use the \u201cSignature\u201d column to find out all the malwares with the \u201cMirai\u201d signature or use the<br>search option with the \u201cMirai\u201d keyword.<br>Task-2: Read the details of the selected malware and download the malware sample using the<br>\u201cdownload sample\u201d link. <br>Task-3: Go to https:\/\/app.any.run\/ and sign up using your odu.edu email. You will be sent a<br>verification link through email. Use the link to log in to the any.run dashboard.<br>Task-4: In any.run dashboard, choose the \u201cSubmit File \/ Email\u201d option to select the previously<br>downloaded malware sample in order to upload for the analysis.<br>Task-5: Once the malware sample is selected, click on the \u201cRun a public analysis\u201d button to<br>upload the sample and run a malware analysis.<br>Task-6: In the bottom part of the any.run screen, you will find information about HTTP<br>Requests, Connections, DNS Requests, and Threats under the Network tab. Here goes an<br>example:<a href=\"https:\/\/app.any.run\/\" target=\"_blank\" rel=\"noreferrer noopener\"><\/a><br>Go through all the information you find for each category (i.e., Http Requests, Connections, DNS<br>Requests, and Threats) and take at least one screenshot showing information from each<br>category.<br>Task-7: Explore information found in the IOC, Text Report, Graph, and ATT&amp;CK tabs on the right<br>side of the screen. Take necessary screenshots showing any interesting finding. 3 points<br>Task-8: Based on the information you found from Task-6 and Task-7, briefly explain the main<br>characteristics of the malware sample. <br>Task-9: Go to https:\/\/bazaar.abuse.ch\/browse\/ again, but this time, select a malware sample<br>with the \u201cVIPKeylogger\u201d signature. Perform malware analysis repeating Task-3 to Task-7. Based<br>on your analysis, explain the main characteristics of this malware sample. <br>Task-10: Discuss the difference between Mirai and VIPKeylogger malwares in your own words.<br><\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Submission:<\/h2>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"894\" height=\"1024\" src=\"https:\/\/sites.wp.odu.edu\/jb23435\/wp-content\/uploads\/sites\/30235\/2025\/04\/image-11-894x1024.png\" alt=\"\" class=\"wp-image-454\" srcset=\"https:\/\/sites.wp.odu.edu\/jb23435\/wp-content\/uploads\/sites\/30235\/2025\/04\/image-11-894x1024.png 894w, https:\/\/sites.wp.odu.edu\/jb23435\/wp-content\/uploads\/sites\/30235\/2025\/04\/image-11-262x300.png 262w, https:\/\/sites.wp.odu.edu\/jb23435\/wp-content\/uploads\/sites\/30235\/2025\/04\/image-11-768x880.png 768w, https:\/\/sites.wp.odu.edu\/jb23435\/wp-content\/uploads\/sites\/30235\/2025\/04\/image-11.png 1062w\" sizes=\"(max-width: 894px) 100vw, 894px\" \/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"688\" height=\"1024\" src=\"https:\/\/sites.wp.odu.edu\/jb23435\/wp-content\/uploads\/sites\/30235\/2025\/04\/image-12-688x1024.png\" alt=\"\" class=\"wp-image-456\" srcset=\"https:\/\/sites.wp.odu.edu\/jb23435\/wp-content\/uploads\/sites\/30235\/2025\/04\/image-12-688x1024.png 688w, https:\/\/sites.wp.odu.edu\/jb23435\/wp-content\/uploads\/sites\/30235\/2025\/04\/image-12-202x300.png 202w, https:\/\/sites.wp.odu.edu\/jb23435\/wp-content\/uploads\/sites\/30235\/2025\/04\/image-12-768x1143.png 768w, https:\/\/sites.wp.odu.edu\/jb23435\/wp-content\/uploads\/sites\/30235\/2025\/04\/image-12.png 800w\" sizes=\"(max-width: 688px) 100vw, 688px\" \/><\/figure>\n\n\n\n<p>8. Connections took place in Germany and Ireland, you can see from the &#8220;Connections&#8221; tab that this malware tries to open a number of connections. Since it&#8217;s a Mirai botnet, it will try to infect a number of IoT devices.<br>9. This malware sample had a virus attached to it and had the same characteristics of having<br>connections in Germany and Ireland. It attempted to open a executable program.                                    10. The difference between the Mirai and the VIPkeylogger is that the VIP malware was more of<br>a threat than the Mirai and attempted to execute a program rather than just mess with settings. Mirai malware focused on infecting IoT devics while VIPKeyloggers focus mostly on tracing keystrokes.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Task-1: Go to https:\/\/bazaar.abuse.ch\/browse\/ and select a malware with the \u201cMirai\u201d signature.Use the \u201cSignature\u201d column to find out all the malwares with the \u201cMirai\u201d signature or use thesearch option with the \u201cMirai\u201d keyword.Task-2: Read the details of the selected malware and download the malware sample using the\u201cdownload sample\u201d link. Task-3: Go to https:\/\/app.any.run\/ and sign&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/jb23435\/malware-analysis\/\">Read More<\/a><\/div>\n","protected":false},"author":24719,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/jb23435\/wp-json\/wp\/v2\/pages\/432"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/jb23435\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/jb23435\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/jb23435\/wp-json\/wp\/v2\/users\/24719"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/jb23435\/wp-json\/wp\/v2\/comments?post=432"}],"version-history":[{"count":3,"href":"https:\/\/sites.wp.odu.edu\/jb23435\/wp-json\/wp\/v2\/pages\/432\/revisions"}],"predecessor-version":[{"id":457,"href":"https:\/\/sites.wp.odu.edu\/jb23435\/wp-json\/wp\/v2\/pages\/432\/revisions\/457"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/jb23435\/wp-json\/wp\/v2\/media?parent=432"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}