Malware Sight-Seeing: Accelerating Reverse-Engineering via Point-of-Interest-Beacons

09/09/2021
by   August See, et al.
0

New types of malware are emerging at concerning rates. However, analyzing malware via reverse engineering is still a time-consuming and mostly manual task. For this reason, it is necessary to develop techniques that automate parts of the reverse engineering process and that can evade the built-in countermeasures of modern malware. The main contribution of this paper is a novel method to automatically find so-called Points-of-Interest (POIs) in executed programs. POIs are instructions that interact with data that is known to an analyst. They can be used as beacons in the analysis of malware and can help to guide the analyst to the interesting parts of the malware. Furthermore, we propose a metric for POIs , the so-called confidence score that estimates how exclusively a POI will process data relevant to the malware. With the goal of automatically extract peers in P2P botnet malware, we demonstrate and evaluate our approach by applying it on four botnets (ZeroAccess, Sality, Nugache, and Kelihos). We looked into the identified POIs for known IPs and ports and, by using this information, leverage it to successfully monitor the botnets. Furthermore, using our scoring system, we show that we can extract peers for each botnet with high accuracy.

READ FULL TEXT
research
06/21/2014

On the Reverse Engineering of the Citadel Botnet

Citadel is an advanced information-stealing malware which targets financ...
research
07/04/2021

Machine Learning for Malware Evolution Detection

Malware evolves over time and antivirus must adapt to such evolution. He...
research
11/27/2021

Evading Malware Analysis Using Reverse Execution

Malware is a security threat, and various means are adapted to detect an...
research
08/09/2021

Malware-on-the-Brain: Illuminating Malware Byte Codes with Images for Malware Classification

Malware is a piece of software that was written with the intent of doing...
research
12/07/2021

Comparative Review of Malware Analysis Methodologies

To fight against the evolution of malware and its development, the speci...
research
11/03/2018

Malware Dynamic Analysis Evasion Techniques: A Survey

The Cyber world is plagued with ever-evolving malware that readily infil...
research
05/11/2023

REMaQE – Reverse Engineering Math Equations from Executables

Cybersecurity attacks against industrial control systems and cyber-physi...

Please sign up or login with your details

Forgot password? Click here to reset