Updates for BASS

This blog post was authored by Jonas Zaddach and Mariano Graziano.

Cisco Talos has rolled out a series of improvements to the BASS open-source framework aimed at speeding up its ability to provide coverage for new malware families. Talos released BASS, (pronounced "bæs") an open-source framework designed to automatically generate antivirus signatures from samples belonging to previously generated malware clusters, last June. It is meant to reduce the amount of resources required to run ClamAV by producing more pattern-based signatures, as opposed to hash-based signatures, and to alleviate the workload of analysts who write pattern-based signatures. The framework is easily scalable, thanks to Docker, an open platform for developers and sysadmins to build, ship, and run distributed applications, whether on laptops, data center VMs, or the cloud.





We have received excellent feedback from the community on this project, which inspired us to make several improvements to the BASS framework. It's clear that there is an interest in automatic signature generation: during the past 10 months, BASS has been forked by 22 researchers from all over the world. The principal motivation is the overwhelming number of samples collected every day, a large percentage of which are composed of portable executable (PE) files, many of which are malicious. There is a constant race to provide quick and effective coverage for these new malware families.

The first release of BASS was very experimental and, like all alpha software, had room to improve. We have worked on the framework, and below, we will walk through the committed changes and new features of BASS. For a more in-depth analysis of BASS, please review the video of our talk and this presentation from the REcon security conference, as well as the Talos blog.

The first set of modifications for BASS ensure that the programs involved in the detection process are properly updated. BASS is based on the interactive disassembler IDA Pro. Periodically, Hex-Rays, the company behind IDA Pro, releases a new version of their disassembler. In September 2017, IDA 7.0 was released, which was significant because IDA is now a native 64-bit application. The first public release of BASS was based on IDA 6.95, the new release officially supports IDA 7.0, which is successfully installed in a Docker container. Binexport is another key component of BASS. Binexport is an IDA Pro plugin that is fundamental to the exportation of information necessary to BinDiff and BinNavi from IDA. Given the massive change in IDA 7.0, binexport's authors released binexport 10, which supports that update. BASS has integrated binexport10 into a working docker environment with IDA Pro 7.0. This container is under the ida7 directory.

Regarding the analysis and the automatic signature generation, the following changes have been pushed:

  • Filtering out functions with less than 10 basic blocks.
  • Filtering out functions that are automatically recognized by IDA (e.g., FLIRT)
  • Function whitelisting support
  • Improved code in charge of the function weight computation
  • More weight to functions containing anti-debug and interesting APIs
  • Less weight to functions containing msvcrt functions
  • Client able to find the optimal signature for a given cluster
  • Experimental ELF support for x86_64 binaries


All these improvements have been extensively tested internally, where BASS is used on a regular basis, which has also lead to many other minor bug fixes.

BASS will continue to be updated to support any changes from dependent software updates. Enhanced framework performance to handle clusters with a significant number of samples, which will continue to be improved upon. We will also continue to research an optimal solution to filter out library functions. For the moment, you can investigate and test our current solutions implemented in the funcdb container.

The code is available on Github: https://github.com/Cisco-Talos/BASS

Name

.NET 0-day 0day ACDSee Adobe advisory adwind AMP Android Antenna House antivirus apple APT arbitrary code execution Attribution Automation Bahamut BASS beers with talos bitcoin Bitvote Black Hat botnet Brazil BRKSEC-2010 CASC chrome cisco Cisco Live Cisco Security Clam AV ClamAV Cobalt group code injection command injection conferences Coverage cryptocurrency cryptomining CSV CTA CVE-2016-8610 CVE-2017-0199 cve-2017-11882 CVE-2017-5638 CVE-2018-3857 CVE-2018-3858 CVE-2018-3859 CVE-2018-3860 CVE-2018-3870 CVE-2018-3871 CVE-2018-8506 cybercrime dark cloud DDE Decryptor Def Con detection dispute DOC DoS Excel Exploit exploit kits RTF fast flux Flash formbook Foscam Foxit Fuzzing gandcrab google GoScanSSH gozi gplayed GravityRAT Group123 Hangul healthcare HWP Hyland IcedID ICS IDA Pro IMAP incident response India inesap infostealer intel iOS IoT iot malware iPhone IR isfb jRAT JScript kernel mode KevDroid Korea Linux macros MalDoc Malware Malware Analysis Malware Research MDM meltdown meraki Microsoft Microsoft Patch Tuesday Middle East miners mining mobile device management monero Moxa ms tuesday natus NavRAT new router malware NordVPN North Korea nvidia Office office router attack Olympic Destoryer Olympic Destroyer Olympics opsec password stealer patch tuesday PDF phishing PhotoLine PLC podcast pony Powershell privilege escalation ProntoVPN PTEX PubNub PubNubRAT py2exe Pyeongchang pyrebox python Qatar ransomware RAT remcos remote access tool remote code execution research research spotlight reven ReversingLabs Rocke Rockwell Automation ROKRAT rootkit rtf ruby ryptoShuffler samsam samsung Scriptlets security updates sennoma signatures SimpleDirect Media Layer smartthings Smoke Loader Snort Snort Rules Sony South Korea spam spectre spyeye stealer steam struts support Talos TALOS-2017-0507 talosintelligence.com telegrab telegram Tetrane Thanatos ThanatosDecryptor threat intelligence Threat Research Threat Research Summit Threat Round-up Threat Roundup ThreatGrid threats TIFF trickbot trojan TTRS Umbrella ursnif VBScript VMI vpn filter attack VPNFiler VPNFilter VPNFilter malware vuln dev vulndev vulnerabilities Vulnerability vulnerability analysis Vulnerability Report Vulnerability Research vulnerability spotlight vulnerabillity vulnerable routers Whitepaper Windows WindowsCodecs.dll wipers xamarin XSS
false
ltr
item
materialize material: Updates for BASS
Updates for BASS
https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjlJbXdL_qf9TDS46iiMDDUOAIFWWp60M3TPjp9dx-_-fF_Xbu95ijJnASGMiI3s2FwPAGsfK6TjuB8PFmPZt3bhYzpIfbkrgdmYSovuxb7Gk_mwWN5QU7C4ZOS3CpKQ1jqOnvv3D2PV44/s640/image1.png
https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjlJbXdL_qf9TDS46iiMDDUOAIFWWp60M3TPjp9dx-_-fF_Xbu95ijJnASGMiI3s2FwPAGsfK6TjuB8PFmPZt3bhYzpIfbkrgdmYSovuxb7Gk_mwWN5QU7C4ZOS3CpKQ1jqOnvv3D2PV44/s72-c/image1.png
materialize material
https://materialize-material.blogspot.com/2018/04/updates-for-bass.html
https://materialize-material.blogspot.com/
http://materialize-material.blogspot.com/
http://materialize-material.blogspot.com/2018/04/updates-for-bass.html
true
1816414542238562206
UTF-8
Not found any posts Not found any related posts VIEW ALL Readmore Reply Cancel reply Delete By Home PAGES POSTS View All RECOMMENDED FOR YOU Tag ARCHIVE SEARCH ALL POSTS Not found any post match with your request Back Home Contents See also related Sunday Monday Tuesday Wednesday Thursday Friday Saturday Sun Mon Tue Wed Thu Fri Sat January February March April May June July August September October November December Jan Feb Mar Apr May Jun Jul Aug Sep Oct Nov Dec just now 1 minute ago $$1$$ minutes ago 1 hour ago $$1$$ hours ago Yesterday $$1$$ days ago $$1$$ weeks ago more than 5 weeks ago Followers Follow THIS CONTENT IS PREMIUM Please share to unlock Copy All Code Select All Code All codes were copied to your clipboard Can not copy the codes / texts, please press [CTRL]+[C] (or CMD+C with Mac) to copy