Cerberus Data Sheet Web

2012-09-19

: Pdf Cerberus Datasheet Web Cerberus_DataSheet_web

Open the PDF directly: View PDF PDF.
Page Count: 2

DownloadCerberus Data Sheet Web
Open PDF In BrowserView PDF
Cerberus

Cerberus reduces the level of expertise required to perform malware analysis,
allowing first and second responders to triage malware and determine
behavior and intent without waiting for a malware team. Now actionable
intelligence can be achieved before sending malware on for deeper analysis.

What is Cerberus?
Cerberus Malware
Analysis is Part of the
CIRT Integrated
Response Platform.
Using CIRT You Can…

Scan computers
across the enterprise
for executables.
Suspect binaries
identified through
host analysis are
automatically given a
threat score.
Set a threat score
threshold:
IF threat ≥ 40 THEN
automatically initiate
stage two.
Basic and advanced
disassembly extracts
arguments to
determine what the
binary is capable of
doing.
Verify behavior and
intent by correlating
data with host and
network analysis.
Remediate and have
CIRT monitor for new
and recurring threats.

Cerberus is a malware triage technology
that is incorporated into AccessData’s
integrated incident response platform,
CIRT (Cyber Intelligence & Response
Technology). It is also available as an
add-on for FTK 4. The first step towards
automated reverse engineering, Cerberus
provides threat scores and disassembly
analysis to determine both the behavior and
intent of suspect binaries.

Cerberus Works in
Two Stages…
Stage 1
During Stage 1 analysis, Cerberus tallies
attributes of each binary to generate threat
scores that approximate how “dangerous”
each binary might be.
Stage 1 looks for characteristics that are
immediately apparent, such as “does this
binary contain a valid digital signature?”,
“is this binary packed?”, and “what
OS functions does this binary import?”
Therefore the Cerberus Stage 1 analysis
is extremely fast and can be run against a
large number of binaries quickly.
Stage 2
Stage 2 analysis is much more complex, as
it disassembles the entire binary, develops
an understanding of the binary code flow,
and outputs a list of operating system
functions that are called by the binary,
along with the arguments that are passed
into those functions. Additional analysis

provides details such as function arguments,
which could reveal things, such as Internet
callback addresses, file names and other
statically compiled artifacts.

Cerberus Malware Triage
vs. Traditional Malware
Analysis…
Triaging potential malware with Cerberus
gives first and second responders immediate
actionable intelligence without waiting for
a malware team to spend days or even
weeks employing traditional methods of
analysis. The Cerberus feature in CIRT
provides response teams with critical threat
information that they can then correlate and
verify with CIRT’s network and host analysis.
Furthermore, while deeper examination
is often needed in the event of a security
incident, these traditional methods each
have its own shortcomings, which Cerberus
methodologies avoid.
•	

Dynamic Analysis is often not reliable,
because the binary could recognize
that it is being analyzed and perform a
different action in order to intentionally
fool the analyst.

•	

Traditional Heuristics are not based
on the fundamental characteristics of
malware and have high false positive /
false negative rates.

•	

Signature-based / Byte String
Analysis cannot detect new malware
or new variants and requires prior
knowledge in the form of an action or
byte string.

STAGE 1:
Identify binaries with
unusually high threat
scores and view attributes
contributing to those scores.

STAGE 2:
View capabilities of binary in
predefined categories along
with arguments.

Contact Us:
NORTH AMERICA SALES
800.574.5199
801.765.4370 (fax)
sales@accessdata.com

INTERNATIONAL SALES
Office: +44 (0)20 7010 7800
internationalsales@accessdata.com



Source Exif Data:
File Type                       : PDF
File Type Extension             : pdf
MIME Type                       : application/pdf
PDF Version                     : 1.4
Linearized                      : No
XMP Toolkit                     : Adobe XMP Core 5.0-c060 61.134777, 2010/02/12-17:32:00
Create Date                     : 2012:02:08 08:03:22-08:00
Metadata Date                   : 2012:02:08 08:03:23-08:00
Modify Date                     : 2012:02:08 08:03:23-08:00
Creator Tool                    : Adobe InDesign CS5 (7.0.3)
Instance ID                     : uuid:8c7b1351-0b52-e645-82d6-35661414cd9d
Document ID                     : xmp.did:7649C92D442668118A6DCF88DE9BDE40
Original Document ID            : xmp.did:FE7F1174072068118A6DCF88DE9BDE40
Rendition Class                 : proof:pdf
History Action                  : created, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved
History Instance ID             : xmp.iid:FE7F1174072068118A6DCF88DE9BDE40, xmp.iid:7C1EE8AF772568118A6DCF88DE9BDE40, xmp.iid:7D1EE8AF772568118A6DCF88DE9BDE40, xmp.iid:1F9266EB782568118A6DCF88DE9BDE40, xmp.iid:289266EB782568118A6DCF88DE9BDE40, xmp.iid:36FD76797D2568118A6DCF88DE9BDE40, xmp.iid:D89255937D2568118A6DCF88DE9BDE40, xmp.iid:3AA1ED53802568118A6DCF88DE9BDE40, xmp.iid:AA90810D812568118A6DCF88DE9BDE40, xmp.iid:99552E04882568118A6DCF88DE9BDE40, xmp.iid:D0C18A5D882568118A6DCF88DE9BDE40, xmp.iid:DAC18A5D882568118A6DCF88DE9BDE40, xmp.iid:6E49C92D442668118A6DCF88DE9BDE40, xmp.iid:7649C92D442668118A6DCF88DE9BDE40, xmp.iid:27DDCB09462668118A6DCF88DE9BDE40, xmp.iid:4195D39A462668118A6DCF88DE9BDE40, xmp.iid:17DCA2C94B2668118A6DCF88DE9BDE40, xmp.iid:DE58604A4D2668118A6DCF88DE9BDE40, xmp.iid:6AF84A704F2668118A6DCF88DE9BDE40, xmp.iid:6BF84A704F2668118A6DCF88DE9BDE40, xmp.iid:42B6B0A9552668118A6DCF88DE9BDE40, xmp.iid:CF69B5C6552668118A6DCF88DE9BDE40
History When                    : 2012:01:18 07:37:19-08:00, 2012:01:18 08:04:30-08:00, 2012:01:18 08:04:30-08:00, 2012:01:18 08:13:19-08:00, 2012:01:18 08:41:38-08:00, 2012:01:18 08:45:55-08:00, 2012:01:18 08:46:39-08:00, 2012:01:18 09:06:21-08:00, 2012:01:18 09:11:32-08:00, 2012:01:18 10:01:23-08:00, 2012:01:18 10:03:53-08:00, 2012:01:18 10:13:29-08:00, 2012:01:19 08:28:22-08:00, 2012:01:19 08:28:22-08:00, 2012:01:19 08:41:41-08:00, 2012:01:19 08:45:44-08:00, 2012:01:19 09:22:50-08:00, 2012:01:19 09:33:36-08:00, 2012:01:19 09:48:58-08:00, 2012:01:19 10:11:31-08:00, 2012:01:19 10:33:32-08:00, 2012:01:19 10:34:20-08:00
History Software Agent          : Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0
History Changed                 : /;/metadata, /metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata
Derived From Instance ID        : xmp.iid:6E49C92D442668118A6DCF88DE9BDE40
Derived From Document ID        : xmp.did:FE7F1174072068118A6DCF88DE9BDE40
Derived From Original Document ID: xmp.did:FE7F1174072068118A6DCF88DE9BDE40
Derived From Rendition Class    : default
Doc Change Count                : 347
Format                          : application/pdf
Producer                        : Adobe PDF Library 9.9
Trapped                         : False
Page Count                      : 2
Creator                         : Adobe InDesign CS5 (7.0.3)
EXIF Metadata provided by EXIF.tools

Navigation menu