Malicious C and C (Command and Control) server determining method and device
A determination method and server technology, applied in the field of information security, can solve the problems such as the inability to guarantee the accuracy of malicious C&C servers, low efficiency, and inability to process data effectively.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0043] figure 1 A schematic diagram of a malicious C&C server determination process provided by an embodiment of the present invention, the process includes:
[0044]S101: simulate the received C&C file, obtain the IP address or Uniform Resource Locator URL associated with the C&C file, and identify whether each preset operation exists in the C&C file, and if the IP address is obtained, proceed to S102, If the URL is acquired, go to S103.
[0045] In the embodiment of the present invention, for the received C&C file, the C&C file is simulated in a windows sandbox, and the message digest algorithm (MessageDigest) of the C&C file can be used during the simulated operation of the C&C file. Algorithm, MD5) value as the unique identifier of the C&C file, when the C&C file is simulated in the windows sandbox, the C&C file can be identified by the MD5 value of the C&C file, and the C&C file association can be obtained IP address or URL, and identify whether each preset operation ex...
Embodiment 2
[0056] On the basis of the above-mentioned embodiments, in the embodiment of the present invention, in order to facilitate the protection and tracking operations on the malicious C&C server, the method further includes:
[0057] If it is determined that the C&C server is a malicious C&C server, the IP address or URL associated with the obtained C&C file is added to the blacklist.
[0058] Specifically, if it is determined that the C&C server is a malicious C&C server, the obtained IP address or URL associated with the C&C file is added to the blacklist. The IP addresses or URLs corresponding to malicious C&C servers saved in the blacklist can be used by technicians to track malicious C&C servers, and can also be used as security protection to reject C&C servers that match the IP addresses or URLs saved in the blacklist Carry out data transmission.
[0059] In order to improve the determination efficiency of the malicious C&C server, on the basis of the above implementations, ...
Embodiment 3
[0073] In order to improve the accuracy of determining the malicious C&C server, on the basis of the above-mentioned embodiments, in the embodiment of the present invention, each preset operation includes at least one of the following operations:
[0074] Registry operations, disable or hide operations, deploy invoke tool operations, network connection operations, hide active interface operations, other process operations, browser operations, and user information collection operations.
[0075] Specifically, the C&C file of a malicious C&C server usually contains registry operations, disabling or hiding operations, deploying and calling tool operations, network connection operations, hiding active interface operations, other process operations, browser operations, and user information collection operations. One or more, so as to change the settings of the host, realize the control of the host, collect user information, etc. In the embodiment of the present invention, for each ...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


