Politeknik Siber dan Sandi Negara

Knowledge Center of Cybersecurity and Cryptography

  • Home
  • Information
  • News
  • Help
  • Librarian
  • Member Area
  • Select Language :
    Arabic Bengali Brazilian Portuguese English Espanol German Indonesian Japanese Malay Persian Russian Thai Turkish Urdu

Search by :

ALL Author Subject ISBN/ISSN Advanced Search

Last search:

{{tmpObj[k].text}}
No image available for this title
Bookmark Share

Text

Analisis malware Nerbian Rat menggunakan metode systematic approach to malware analysis (SAMA) pada sistem operasi windows

Amiruddin - Personal Name; Septia Ulfa Sunaringtyas - Personal Name; Ira Rosianal Hikmah - Personal Name; Ayu Ningtyas Nurfuadah - Personal Name;

Abstrak:
Ancaman malware terus meningkat setiap tahunnya dan varian malware baru semakin banyak muncul dengan teknik baru yang dilakukannya. Oleh karena itu, dibutuhkan pendekatan sistematis untuk menganalisis malware yang menyerang sistem. Pada penelitian tugas akhir ini telah dilakukan analisis malware menggunakan metodologi Systematic Approach to Malware Analysis (SAMA) untuk menganalisis malware tipe RAT, dengan fokus pada sampel malware Nerbian RAT, di lingkungan virtual pada sistem operasi Windows. Hasil penelitian menyajikan wawasan terkait karakteristik dan kemampuan Nerbian RAT. Ditemukan bahwa 52 dari 71 vendor antivirus di VirusTotal mendeteksi sampel sebagai malware. Sampel dikemas dengan UPX untuk menghindari deteksi dan ditulis dalam bahasa Golang. Memiliki kemampuan anti-analisis dan teknik menghindar terhadap deteksi sistem analisis malware sehingga tidak mampu dalam mengungkapkan perilaku malware selama analisis. Sampel Nerbian RAT terbukti memiliki fungsi utama untuk mengakses sistem dari jarak jauh dan melakukan pencurian informasi sensitif melalui tangkapan layar. Penelitian ini juga mengungkapkan adanya fungsi kriptografi dan dekripsi yang digunakan untuk melindungi komunikasi dan payload malware. Ditemukan adanya komunikasi dengan alamat IP tertentu. Hasil analisis ini memberikan pemahaman lebih lanjut tentang potensi ancaman dan dampak Nerbian RAT. Kemudian disusun langkah-langkah mitigasi menggunakan framework MITRE ATT&CK seperti pemantauan aktivitas jaringan, manajemen hak akses, penggunaan antivirus, dan penerapan aturan deteksi yang lebih ketat. Rekomendasi ini diharapkan dapat membantu dalam menghadapi ancaman malware Nerbian RAT di masa mendatang.

Abstract:
The threat of malware continues to escalate each year, with new malware variants emerging in increasing numbers, employing novel techniques. Therefore, a systematic approach is necessary to analyze the malware that targets systems. This final project research conducted a malware analysis using the Systematic Approach to Malware Analysis (SAMA) methodology, focusing on the RAT type of malware, specifically the Nerbian RAT sample, within a virtual environment on the Windows operating system. The research results provide insights into the characteristics and capabilities of Nerbian RAT. It was found that out of 71 antivirus vendors on VirusTotal, 52 detected the sample as malware. The sample was packed with UPX to evade detection and written in the Golang programming language. It exhibited anti-analysis capabilities and evasion techniques against malware analysis systems, rendering them incapable of revealing the malware's behavior during analysis. The Nerbian RAT sample proved to have a primary function of remote system access and sensitive information theft through screenshot capture. The study also unveiled the presence of cryptography and decryption functions utilized to safeguard communication and the malware's payload. Communication with specific IP addresses was also identified. The analysis results offer a deeper understanding of the potential threats and impact posed by Nerbian RAT. Subsequently, mitigation steps were devised using the MITRE ATT&CK Framework, including network activity monitoring, access rights management, antivirus utilization, and the implementation of stricter detection rules. These recommendations are anticipated to assist in addressing future threats of the Nerbian RAT malware.


Availability
#
Rekayasa Keamanan Siber 2023 AYU a
TA20230101682
Available - Read on Location
#
Rekayasa Keamanan Siber 2023 AYU a
TA20230101683
Available - Read on Location
Detail Information
Series Title
--
Call Number
2023 AYU a
Publisher
Bogor : Politeknik Siber dan Sandi Negara., 2023
Collation
xv, 91 halaman
Language
Indonesia
ISBN/ISSN
--
Classification
Rekayasa Keamanan Siber
Content Type
-
Media Type
-
Carrier Type
-
Edition
--
Subject(s)
Analisis Malware
behavioural analysis
code analysis
Golang malware
metodologi SAMA
Nerbian RAT
RAT
Specific Detail Info
--
Statement of Responsibility
Ayu Ningtyas Nurfuadah
Other version/related

No other version available

File Attachment
No Data
Comments

You must be logged in to post a comment

Politeknik Siber dan Sandi Negara
  • Information
  • Services
  • Librarian
  • Member Area

About Us

Perpustakaan Politeknik Siber dan Sandi Negara menyediakan berbagai macam koleksi seperti Buku, Jurnal, Majalah, Koran, Referensi dan Konten Lokal.

Search

start it by typing one or more keywords for title, author or subject

Keep SLiMS Alive Want to Contribute?

© 2025 — Senayan Developer Community

Powered by SLiMS
Select the topic you are interested in
  • Computer Science, Information & General Works
  • Philosophy & Psychology
  • Religion
  • Social Sciences
  • Language
  • Pure Science
  • Applied Sciences
  • Art & Recreation
  • Literature
  • History & Geography
Icons made by Freepik from www.flaticon.com
Advanced Search
Where do you want to share?