Python']Python and Malware: Developing Stealth and Evasive Malware without Obfuscation

被引:1
|
作者
Koutsokostas, Vasilios [1 ]
Patsakis, Constantinos [1 ,2 ]
机构
[1] Univ Piraeus, Inst Problem Solving, Dept Informat, Piraeus, Greece
[2] Athena Res Ctr, Informat Management Syst Inst, Artemidos 6, Maroussi 15125, Greece
来源
SECRYPT 2021: PROCEEDINGS OF THE 18TH INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY | 2021年
基金
欧盟地平线“2020”;
关键词
Malware; Antivirus; !text type='Python']Python[!/text; Evasion; Sandbox;
D O I
10.5220/0010541501250136
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With the continuous rise of malicious campaigns and the exploitation of new attack vectors, it is necessary to assess the efficacy of the defensive mechanisms used to detect them. To this end, the contribution of our work is twofold. First, it introduces a new method for obfuscating malicious code to bypass all static checks of multi-engine scanners, such as VirusTotal. Interestingly, our approach to generating the malicious executables is not based on introducing a new packer but on the augmentation of the capabilities of an existing and widely used tool for packaging Python, PyInstaller but can be used for all similar packaging tools. As we prove, the problem is deeper and inherent in almost all antivirus engines and not PyInstaller specific. Second, our work exposes significant issues of well-known sandboxes that allow malware to evade their checks. As a result, we show that stealth and evasive malware can be efficiently developed, bypassing with ease state of the art malware detection tools without raising any alert.
引用
收藏
页码:125 / 136
页数:12
相关论文
共 31 条
  • [1] On the Dissection of Evasive Malware
    D'Elia, Daniele Cono
    Coppa, Emilio
    Palmaro, Federico
    Cavallaro, Lorenzo
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2020, 15 : 2750 - 2765
  • [2] Stealth attacks: An extended insight into the obfuscation effects on Android malware
    Maiorca, Davide
    Ariu, Davide
    Corona, Igino
    Aresu, Marco
    Giacinto, Giorgio
    COMPUTERS & SECURITY, 2015, 51 : 16 - 31
  • [3] Obfuscation: The Hidden Malware
    O'Kane, Philip
    Sezer, Sakir
    McLaughlin, Kieran
    IEEE SECURITY & PRIVACY, 2011, 9 (05) : 41 - 47
  • [4] Proposed Classification of Malware, Based on Obfuscation
    Barria, Cristian
    Cubillos, Claudio
    Cordero, David
    Palma, Miguel
    2016 6TH INTERNATIONAL CONFERENCE ON COMPUTERS COMMUNICATIONS AND CONTROL (ICCCC), 2016, : 37 - 44
  • [5] Evasive Windows Malware: Impact on Antiviruses and Possible Countermeasures
    Herzog, Cedric
    Tong, Valerie Viet Triem
    Wilke, Pierre
    Van Straaten, Arnaud
    Lanet, Jean-Louis
    PROCEEDINGS OF THE 17TH INTERNATIONAL JOINT CONFERENCE ON E-BUSINESS AND TELECOMMUNICATIONS (SECRYPT), VOL 1, 2020, : 302 - 309
  • [6] Detection of obfuscation in java']java malware
    Kumar, Renuka
    Vaishakh, Anand Raj Essar
    1ST INTERNATIONAL CONFERENCE ON INFORMATION SECURITY & PRIVACY 2015, 2016, 78 : 521 - 529
  • [7] On the Effectiveness of Perturbations in Generating Evasive Malware Variants
    Jin, Beomjin
    Choi, Jusop
    Hong, Jin B.
    Kim, Hyoungshick
    IEEE ACCESS, 2023, 11 : 31062 - 31074
  • [8] iSAM: An iPhone Stealth Airborne Malware
    Damopoulos, Dimitrios
    Kambourakis, Georgios
    Gritzalis, Stefanos
    FUTURE CHALLENGES IN SECURITY AND PRIVACY FOR ACADEMIA AND INDUSTRY, 2011, 354 : 17 - 28
  • [9] Malware Obfuscation Measuring via Evolutionary Similarity
    Li, Jian
    Xu, Jun
    Xu, Ming
    Zhao, HengLi
    Zheng, Ning
    2009 FIRST INTERNATIONAL CONFERENCE ON FUTURE INFORMATION NETWORKS, 2009, : 197 - +
  • [10] Malware Obfuscation Detection via Maximal Patterns
    Li, Jian
    Xu, Ming
    Zheng, Ning
    Xu, Jian
    2009 THIRD INTERNATIONAL SYMPOSIUM ON INTELLIGENT INFORMATION TECHNOLOGY APPLICATION, VOL 2, PROCEEDINGS, 2009, : 324 - 328