Raul Alvarez

Senior Security Reseacher Fortinet Technologies (USA)

BIOGRAPHY

Raul is working at Fortinet as a Senior Security Researcher/ AV Team Lead since 2004. He is also the Lead Trainer responsible for training junior AV/IPS analysts in malware analysis and reverse engineering.

He is a regular contributor in his company blog posts and also in Virus Bulletin publication. He currently have 21 published articles in Virus Bulletin.

Before Raul joined Fortinet, he was a Senior AntiVirus Engineer and an AntiVirus Trainer at TrendMicro Philippines.

Raul was also a college instructor at two major universities in the Philippines.

Challenges on Reversing Layered Malware

Malware analysis using automated tools and sandboxes is the best and fastest response against malicious file execution. We can easily determine the effects of the malware, including network activities and system infection.

Modern malware are now smarter than before, they can determine if they are being analyzed, being debugged, or simply being executed in a virtual environment. But to really know how the malware works, we have to dig deeper into its code.

Layers in malware are defense mechanisms against deep analysis. Within these layers, different malware tricks are also deployed.

In this presentation, we are going to look into Scieron, an information stealer Trojan. It is not known in the wild, perhaps due to its implementation of layers. We are going to look closely into its code on how it implements code injection and hooking. We will look into its use of shellcode and how it extracts another layer from the resource section of another layer. Also, we will investigate how it implements different layers to hide its main payload and to avoid detection.

I will show a video demo on how the layers of Scieron are executed within the debugger.

Also in this presentation, we will compare Scieron against Vawtrak, that also has layering technology in its code.

Finally, we are going to leverage Volatility, a memory forensic tool, to detect the presence of layers in an infected system.

Are you the next cyber security superstar?

If you are passionate about an information security topic or you have strong technical skills developing researches on your own, you should definitely Apply at Call for Papers. By submitting you will have the chance to showcase your work to +2000 attendees.

Other speakers joining this year

Shah Sheikh

Sr. Security Consultant DTS Solution (UAE)

SPEAKER INTERVIEW AVAILABLE

Andrey Lovyannikov

Co-Founder AVULN Security Industries & Embedded Systems Reverse Engineering Expert (RU)

Robert Knapp

CEO and Co-founder CyberGhost

Ready for this year's presentations?

By registering you will unlock access to 60+ speakers and two full days with cyber security news & showcases from worldwide leaders.

0
SPEAKERS
0
COUNTRIES
0
ATTENDEES
0
HACKING
COMPETITIONS
0
COMPANIES

Sponsors & Partners

They help us make this conference possible.

POWERED BY

Orange „brings you closer to what matters to you”.

This is our brand promise: to bring our clients closer to what’s essential to them and to keep them always connected and in touch with the latest technologies, by offering them the best and safest communication experience.

WWW.ORANGE.RO

PLATINUM PARTNERS

Ixia provides testing, visibility, security solutions, network testing tools and virtual network security solutions to strengthen applications across physical and virtual networks.

WWW.IXIACOM.COM

Secureworks provides threat intelligence-driven security solutions for organizations to prevent, detect, rapidly respond and predict cyberattacks.

WWW.SECUREWORKS.COM

GOLD PARTNERS
SILVER PARTNERS
GAMING PARTNER
VIP & SPEAKERS LOUNGE PARTNER
BRONZE PARTNERS
COMMUNITY & MEDIA PARTNERS