Lupo: Malware IOC Extractor - Vishal Thakur

Collapse
X
 
  • Time
  • Show
Clear All
new posts
  • number6
    404 Image not found
    • Apr 2019
    • 2172

    #1

    Lupo: Malware IOC Extractor - Vishal Thakur

    Lupo: Malware IOC Extractor

    Saturday August 12, 10:00 – 11:55, Caucus Boardroom, Forum

    Vishal Thakur

    Lupo is a dynamic analysis tool that can be used as a module with the debugger.

    Vishal Thakur has worked in the information security industry for many years in hands-on technical roles, specializing in Incident Response with a heavy focus on Emerging Threats, Malware Analysis and Research. He has presented his research at international conferences (BlackHat, FIRST, SANS DFIR Summit) and has also run training/workshops at BlackHat and FIRST Conference. Vishal is currently working as Manager, Threat Operations Center at Huntress. In past roles, Vishal worked as a Senior Researcher at Salesforce, helping their Incident Response Centre with advanced threat analysis and developing DFIR tools and has been a part of the Incident Response team at the Commonwealth Bank of Australia.

    Audience - Defense, Malware Analysis, Reverse Engineering


    Starts
    August 12, 2023 10:00
    Ends
    August 12, 2023 11:55
    Location
    Caucus Boardroom, Forum
  • malienist
    Member
    • Jul 2023
    • 1

    #2
    Working on security incidents that involve malware, we come across situations on a regular basis where we feel the need to automate parts of the analysis process as complete manual analysis is, more often than not, not possible for every case due to many factors (time, skills, scale etc.).

    I wrote Lupo mainly to automate and accelerate the process as much as possible. Lupo is a dynamic analysis tool that can be used as a module with the debugger. The first version works with the popular Windows Debugger — WinDbg. I’ll release versions for other debuggers in the future.

    The way the tool works is pretty straight forward. You load Lupo into the debugger and then execute it. It runs through the malware and collects predefined IOC and writes them to a text file on the disk. You can then use this information to contain and neutralise malware campaigns or simply respond to the security incident that you are working on.

    Comment

    Working...