End-to-End Analysis of a Domain Generating Algorithm Malware Family

Select malware families have used Domain Generating Algorithms (DGAs) over the past few years in an effort to evade analysts’ abilities to predict attackers’ control servers. This presentation demonstrates end-to-end analysis of a DGA malware family, from binary deobfuscation to DGA analysis, to sinkholing, to domain registrant research, to attribution of the malware’s author and accomplices.



Jason Geffner Senior Security Researcher, CrowdStrike, Inc.

← View more Videos

This document was retrieved from on Mon, 24 Oct 2016 21:24:30 -0400.
© 2016 EMC Corporation. All rights reserved.