6.3. Backdoor Technology

6.3.1. Development Technology

  • Management and control function realization technology
    • System management: View basic system information, process management, service management

    • File management: copy/paste files, delete files/directories, download/upload files, etc.

    • Shell management

    • keystroke logging monitoring

    • screenshot

    • Audio monitoring

    • Video Surveillance

    • View private information

    • Dynamic Monitoring of Removable Disks

    • Remote uninstall

  • self-starting technology
    • Windows auto-start
      • Self-starting based on Windows startup directory

      • Registry-based auto-start

      • Service program-based self-start

      • Self-starting based on ActiveX control

      • Self-starting based on Scheduled Tasks

    • Linux self-starting

  • User mode process hiding technology
    • Process hiding based on DLL insertion
      • Remote Thread Creation Technology

      • Setting the Window Hook (HOOK) Technique

    • Process Hiding Based on SvcHost Shared Service

    • process memory replacement

  • Data Penetration and Avoidance Techniques
    • reverse port

    • protocol tunnel
      • HTTP

      • MSN

      • Google Talk

  • Kernel-Level Hidden Technology(Rootkit)

  • Disk boot-level hiding technology(Bootkit)
    • MBR

    • BIOS

    • NTLDR

    • boot.ini

  • Restoring software countermeasures

6.3.2. Backdoor avoid killing

  • Traditional static code detection
    • packer

    • Add flower instruction

    • Enter the form to avoid killing

  • Heuristic code detection
    • dynamic function call

  • Cloud killing
    • Dynamically increase its size

    • Change the domain name resolution address of the cloud killing server

    • disconnected

    • Bypassing Cloud “Whitelisting” Using Hash Collision

  • Attack the main antivirus software
    • Change system time

    • window message attack

    • Actively send IRP to control the main defense driver

  • Use certificate trust
    • Stealing and exploiting legal certificates

    • Forging certificates using hash collision

    • The “white and black” of the DLL hijacking problem with legitimate programs

6.3.3. Detection technology

  • Detection based on self-starting information

  • Detection based on process information

  • Detection based on data transmission

  • Rootkit/Bootkit Detection

6.3.4. Backdoor Analysis

  • Dynamic Analysis

  • static analysis
    • Antivirus engine scan

    • file format recognition

    • File packing recognition and unpacking

    • plaintext string lookup

    • Link library and import/export function analysis