A Deep Dive into VirusTotal: Characterizing and Clustering a Massive File Feed

10/28/2022
by   Kevin van Liebergen, et al.
0

Online scanners analyze user-submitted files with a large number of security tools and provide access to the analysis results. As the most popular online scanner, VirusTotal (VT) is often used for determining if samples are malicious, labeling samples with their family, hunting for new threats, and collecting malware samples. We analyze 328M VT reports for 235M samples collected for one year through the VT file feed. We use the reports to characterize the VT file feed in depth and compare it with the telemetry of a large security vendor. We answer questions such as How diverse is the feed? Does it allow building malware datasets for different filetypes? How fresh are the samples it provides? What is the distribution of malware families it sees? Does that distribution really represent malware on user devices? We then explore how to perform threat hunting at scale by investigating scalable approaches that can produce high purity clusters on the 235M feed samples. We investigate three clustering approaches: hierarchical agglomerative clustering (HAC), a more scalable HAC variant for TLSH digests (HAC-T), and a simple feature value grouping (FVG). Our results show that HAC-T and FVG using selected features produce high precision clusters on ground truth datasets. However, only FVG scales to the daily influx of samples in the feed. Moreover, FVG takes 15 hours to cluster the whole dataset of 235M samples. Finally, we use the produced clusters for threat hunting, namely for detecting 190K samples thought to be benign (i.e., with zero detections) that may really be malicious because they belong to 29K clusters where most samples are detected as malicious.

READ FULL TEXT

page 5

page 6

page 7

page 8

page 9

research
05/01/2023

Classification and Online Clustering of Zero-Day Malware

A large amount of new malware is constantly being generated, which must ...
research
10/01/2019

An Analysis of Malware Trends in Enterprise Networks

We present an empirical and large-scale analysis of malware samples capt...
research
11/18/2022

Clustering based opcode graph generation for malware variant detection

Malwares are the key means leveraged by threat actors in the cyber space...
research
06/09/2023

AVScan2Vec: Feature Learning on Antivirus Scan Data for Production-Scale Malware Corpora

When investigating a malicious file, searching for related files is a co...
research
03/13/2019

ALOHA: Auxiliary Loss Optimization for Hypothesis Augmentation

Malware detection is a popular application of Machine Learning for Infor...
research
12/01/2020

Game Theoretic Malware Detection

Large software platforms (e.g., mobile app stores, social media, email s...
research
07/31/2020

Identifying meaningful clusters in malware data

Finding meaningful clusters in drive-by-download malware data is a parti...

Please sign up or login with your details

Forgot password? Click here to reset