Discovering Encrypted Bot and Ransomware Payloads Through Memory Inspection Without A Priori Knowledge

07/27/2019
by   Peter McLaren, et al.
0

Malware writers frequently try to hide the activities of their agents within tunnelled traffic. Within the Kill Chain model the infection time is often measured in seconds, and if the infection is not detected and blocked, the malware agent, such as a bot, will often then set up a secret channel to communicate with its controller. In the case of ransomware the communicated payload may include the encryption key used for the infected host to register its infection. As a malware infection can spread across a network in seconds, it is often important to detect its activities on the air, in memory and at-rest. Malware increasingly uses encrypted channels for communicating with their controllers. This paper presents a new approach to discovering the cryptographic artefacts of real malware clients that use cryptographic libraries of the Microsoft Windows operating system. This enables malware secret communications to be discovered without any prior malware knowledge.

READ FULL TEXT

page 1

page 4

research
01/28/2022

Agent-based modeling and simulation for malware spreading in D2D networks

This paper presents a new multi-agent model for simulating malware propa...
research
08/26/2019

Modeling infection methods of computer malware in the presence of vaccinations using epidemiological models: An analysis of real-world data

Computer malware and biological pathogens often use similar mechanisms o...
research
07/18/2020

A process calculus approach to correctness enforcement of PLCs (full version)

We define a simple process calculus, based on Hennessy and Regan's Timed...
research
07/18/2023

CBSeq: A Channel-level Behavior Sequence For Encrypted Malware Traffic Detection

Machine learning and neural networks have become increasingly popular so...
research
10/13/2022

SoK: How Not to Architect Your Next-Generation TEE Malware?

Besides Intel's SGX technology, there are long-running discussions on ho...
research
02/07/2019

Dual-task agent for run-time classification and killing of malicious processes

Malicious software (malware) is one of the key vectors for cyber crimina...
research
10/22/2020

Malware Traffic Classification: Evaluation of Algorithms and an Automated Ground-truth Generation Pipeline

Identifying threats in a network traffic flow which is encrypted is uniq...

Please sign up or login with your details

Forgot password? Click here to reset