官术网_书友最值得收藏!

  • Mastering Reverse Engineering
  • Reginald Wong
  • 242字
  • 2021-06-10 19:40:26

Media storage

Network administrators are very restrictive when it comes to using thumb drives. The primary reason is that external storage devices, such as USB thumb drives, CDs, DVDs, external hard drives, and even smartphones are all media in which malware can store itself. Once a storage device gets mounted to a computer, it serves like a regular drive. Malware can simply drop copies of itself to these storage drives. Similar to network worms, these are worms that depend on the user to run the malware. But with the Windows Autorun feature turned on, malware may execute once the drive is mounted, as can be seen in the following screenshot:

The previous image is the default dialog encountered when inserting a CD drive containing setup software.

The autorun.inf file in the root of a drive contains information on which file to automatically execute. This is used by software installers stored in CDs so that, when the disk is inserted, it automatically runs the setup program. This is abused by malware by doing these steps:

  1. Dropping a copy of its malware file in removable drives
  2. Along  with its dropped copy, it generates an autorun.inf file that points to the dropped executable file, as can be seen in the following example:

The autorun.inf for the VirtualBox setup autoplay dialog shown previously contains the text as shown in the previous screenshot. The open property contains the executable to be run.  

主站蜘蛛池模板: 象山县| 高雄市| 鹿邑县| 涞水县| 武隆县| 台安县| 腾冲县| 鸡东县| 高阳县| 高平市| 盘锦市| 黄浦区| 山西省| 来宾市| 科技| 抚松县| 万源市| 铜梁县| 缙云县| 广东省| 福建省| 台山市| 盐亭县| 高要市| 久治县| 昌乐县| 巴塘县| 得荣县| 资源县| 富川| 新民市| 沧州市| 绥德县| 白玉县| 邹平县| 灌云县| 九龙城区| 定西市| 新野县| 民乐县| 宝山区|