8

This question has probably been asked several times here, but I'll ask it a bit differently.

I am trying to learn about malware and how it infects computers and how to disinfect a computer if one gets attacked. I've seen several people use virtual machines to test malware in (I've been using VirtualBox for a few years now) and I've contemplated on doing it too, but I fear that the malware might "leak out" of the VM and ruin my host computer and all of the computers on my network.

The questions I have are:

  1. Can I test malware in VirtualBox with access to the Internet within the VM without harming my host computer or any of the other computers on my network?

  2. If I use a real computer to test malware on (I have a junky Dell XP tower kicking around), will formatting afterwords be enough?

  3. Can my Dell XP tower also have the Internet enabled without the malware effecting my other computers?

  4. Even if I can't have both the Internet enabled and use malware within the VM at the same time, can that malware still "hop out" of the VM and attack my host computer?

  5. Since I will also be 'pranking' some of those cliche Windows scammers (well, not really pranking, just testing ways that they can get in and do damage), would it be safe to use a VM, or can I even use that junky Dell of mine?

  6. Will it also be necessary to mask my IP and MAC addresses so that they aren't logged and sent out to whoever could receive it while I'm doing the malware testing?

  7. If I can safely execute malware within a VM, what steps are necessary for keeping my real stuff safe?

If this helps, my host computer will either be a Mac running OS X 10.8.5, or a tower running XP (not my Dell one).

And the guest will be any OS, but mainly Windows (yes, from newest to oldest)

I hope I explained this well enough for you guys.

Any and all help will be greatly appreciated.

Thank you!

Terkey-Juice
  • 181
  • 1
  • 1
  • 4
  • Access to the Internet? Not a good idea as depending on what it does, you VM could release it "into the wild". Running it in a VM should be perfectly fine if it is not connected to the internet. 2. Formatting should be fine for 99% of malware. Some can attack to other areas other than harddrive though so keep that in mind and research what you are playing with.
  • – IT_User May 13 '16 at 04:52
  • When I say "running it in a VM should be perfectly fine", there has been talk of exploiting a programming error on exiting a VM. But it is way over my head of comprehension on how it works. Your fine running it in a VM without Internet access. – IT_User May 13 '16 at 05:00
  • When I state "way over my head" it's not that I'm a know it all when It comes to this but that the general concensus is "your fine" – IT_User May 13 '16 at 05:12
  • Thanks for the responses. What about using that junky Dell of mine? Is that okay too, if it's not connected to the Internet? – Terkey-Juice May 13 '16 at 05:29
  • Yes it is. You shouldnt have any issues with just formatting. There is extremely sophisticated malware that can reside if MBR, bios, firmware, but this would be way above everyday malware. UNLESS you have peripherals attached (USB drive for example). – IT_User May 13 '16 at 05:34
  • If I formatted from FAT32 to NTFS and vice versa each time the Dell tower is infected, does that lessen the chances of malware residing in the MBR? – Terkey-Juice May 13 '16 at 06:37
  • I am not 100% sure of that, but there are many tools out there that will allow you to rebuild the MBR, or using a windows recovery disk should allow you to perform a low-level format which should accomplish this. – IT_User May 13 '16 at 14:13
  • 3
    It may be hard to see what the malware is doing without internet access (I.e. it might need to download a payload or check in with a CnC server first). For this purpose, I put malware testing VMs behind a virtual machine that acts as a router, but transparently shoves everything through tor. – multithr3at3d May 13 '16 at 18:18
  • @korockinout13 So how can I go about doing this? It sounds effective, but kinda confusing. Also, I have read in several places that using a bridged connection is best. I have even seen some people say that NAT is best. Are any of those true? – Terkey-Juice May 14 '16 at 15:49
  • 1
    A bridged connection gives the machine a direct connection to your local network, which is a bad idea. NAT is okay, but it could still be possible for the machine to connect to devices on the network. An internal network with some isolating router is the best solution. – multithr3at3d May 16 '16 at 17:01