Главная
Study mode:
on
1
Barncat: Using MISP for Bulk Surveillance of Malware
2
Introduction • Manager of Threat Systems with Fidelis Cybersecurity
3
Malware Config Ripping - Dynamic analysis is good, but bin may not run correctly and is resource intensive
4
Your Starter Kit
5
What can you do with malware configs? • Sinkholing for victim notification is a possibility
6
Sample DarkComet Data
7
Example Config
8
What can you do with this?
9
Digging deeper
10
Dark Comet Campaign
11
Barncat Access
Description:
Learn about using MISP (Malware Information Sharing Platform) for bulk surveillance of malware in this conference talk from the MISP Summit 2017. Explore the benefits of malware config ripping as an alternative to resource-intensive dynamic analysis. Discover the tools needed to get started and understand the potential applications of malware configurations, including sinkholing for victim notification. Examine sample data from DarkComet malware and analyze example configurations to gain deeper insights. Follow along as the speaker demonstrates how to dig deeper into malware campaigns and access the Barncat platform for enhanced threat intelligence. Gain valuable knowledge on leveraging MISP for more effective malware analysis and threat detection.

Barncat - Using MISP for Bulk Surveillance of Malware

Cooper
Add to list
0:00 / 0:00