Python']Python and Malware: Developing Stealth and Evasive Malware without Obfuscation

被引:1
|
作者
Koutsokostas, Vasilios [1 ]
Patsakis, Constantinos [1 ,2 ]
机构
[1] Univ Piraeus, Inst Problem Solving, Dept Informat, Piraeus, Greece
[2] Athena Res Ctr, Informat Management Syst Inst, Artemidos 6, Maroussi 15125, Greece
来源
SECRYPT 2021: PROCEEDINGS OF THE 18TH INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY | 2021年
基金
欧盟地平线“2020”;
关键词
Malware; Antivirus; !text type='Python']Python[!/text; Evasion; Sandbox;
D O I
10.5220/0010541501250136
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With the continuous rise of malicious campaigns and the exploitation of new attack vectors, it is necessary to assess the efficacy of the defensive mechanisms used to detect them. To this end, the contribution of our work is twofold. First, it introduces a new method for obfuscating malicious code to bypass all static checks of multi-engine scanners, such as VirusTotal. Interestingly, our approach to generating the malicious executables is not based on introducing a new packer but on the augmentation of the capabilities of an existing and widely used tool for packaging Python, PyInstaller but can be used for all similar packaging tools. As we prove, the problem is deeper and inherent in almost all antivirus engines and not PyInstaller specific. Second, our work exposes significant issues of well-known sandboxes that allow malware to evade their checks. As a result, we show that stealth and evasive malware can be efficiently developed, bypassing with ease state of the art malware detection tools without raising any alert.
引用
收藏
页码:125 / 136
页数:12
相关论文
共 31 条
  • [21] Malware Speaks! Deep Learning Based Assembly Code Processing for Detecting Evasive Cryptojacking
    Mani, Ganapathy
    Kim, Myeongsu
    Bhargava, Bharat
    Angin, Pelin
    Deniz, Ayca
    Pasumarti, Vikram
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2024, 21 (04) : 2461 - 2477
  • [22] Malware detection using static analysis in Android: a review of FeCO (features, classification, and obfuscation)
    Jusoh, Rosmalissa
    Firdaus, Ahmad
    Anwar, Shahid
    Osman, Mohd Zamri
    Darmawan, Mohd Faaizie
    Ab Razak, Mohd Faizal
    PEERJ COMPUTER SCIENCE, 2021, 7 : 1 - 54
  • [23] Developing a K-ary malware using Blockchain
    Moubarak, Joanna
    Chamoun, Maroun
    Filiol, Eric
    NOMS 2018 - 2018 IEEE/IFIP NETWORK OPERATIONS AND MANAGEMENT SYMPOSIUM, 2018,
  • [24] Poster: Obfuscation Revealed - Using Electromagnetic Emanation to Identify and Classify Malware<bold> </bold>
    Duy-Phuc Pham
    Marion, Damien
    Heuser, Annelie
    2021 IEEE EUROPEAN SYMPOSIUM ON SECURITY AND PRIVACY (EUROS&P 2021), 2021, : 710 - 712
  • [25] A Survey of Stealth Malware Attacks, Mitigation Measures, and Steps Toward Autonomous Open World Solutions
    Rudd, Ethan M.
    Rozsa, Andras
    Gunther, Manuel
    Boult, Terrance E.
    IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2017, 19 (02): : 1145 - 1172
  • [26] Light up that Droid! On the effectiveness of static analysis features against app obfuscation for Android malware detection
    Molina-Coronado, Borja
    Ruggia, Antonio
    Mori, Usue
    Merlo, Alessio
    Mendiburu, Alexander
    Miguel-Alonso, Jose
    JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2025, 235
  • [27] DaDiDroid: An Obfuscation Resilient Tool for Detecting Android Malware via Weighted Directed Call Graph Modelling
    Ikram, Muhammad
    Beaume, Pierrick
    Kaafar, Mohamed Ali
    PROCEEDINGS OF THE 16TH INTERNATIONAL JOINT CONFERENCE ON E-BUSINESS AND TELECOMMUNICATIONS, VOL 2: SECRYPT, 2019, : 211 - 219
  • [28] Partial Outsourcing of Malware Dynamic Analysis Without Disclosing File Contents
    Hamajima, Keisuke
    Kotani, Daisuke
    Okabe, Yasuo
    2023 IEEE 47TH ANNUAL COMPUTERS, SOFTWARE, AND APPLICATIONS CONFERENCE, COMPSAC, 2023, : 717 - 722
  • [29] Developing an Intelligent Intrusion Detection and Prevention System against Web Application Malware
    Alazab, Ammar
    Hobbs, Michael
    Abawajy, Jemal
    Khraisat, Ansam
    ADVANCES IN SECURITY OF INFORMATION AND COMMUNICATION NETWORKS, 2013, 381 : 177 - +
  • [30] Toward Developing a Systematic Approach to Generate Benchmark Android Malware Datasets and Classification
    Lashkari, Arash Habibi
    Kadir, Andi Fitriah A.
    Taheri, Laya
    Ghorbani, Ali A.
    2018 52ND ANNUAL IEEE INTERNATIONAL CARNAHAN CONFERENCE ON SECURITY TECHNOLOGY (ICCST), 2018, : 242 - 248