Precise system-wide concatic malware unpacking

08/24/2019
by   David Korczynski, et al.
0

Run time packing is a common approach malware use to obfuscate their payloads, and automatic unpacking is, therefore, highly relevant. The problem has received much attention, and so far, solutions based on dynamic analysis have been the most successful. Nevertheless, existing solutions lack in several areas, both conceptually and architecturally, because they focus on a limited part of the unpacking problem. These limitations significantly impact their applicability, and current unpackers have, therefore, experienced limited adoption. In this paper, we introduce a new tool, called Minerva, for effective automatic unpacking of malware samples. Minerva introduces a unified approach to precisely uncover execution waves in a packed malware sample and produce PE files that are well-suited for follow-up static analysis. At the core, Minerva deploys a novel information flow model of system-wide dynamically generated code, precise collection of API calls and a new approach for merging execution waves and API calls. Together, these novelties amplify the generality and precision of automatic unpacking and make the output of Minerva highly usable. We extensively evaluate Minerva against synthetic and real-world malware samples and show that our techniques significantly improve on several aspects compared to previous work.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
02/13/2018

Towards Generic Deobfuscation of Windows API Calls

A common way to get insight into a malicious program's functionality is ...
research
08/08/2023

DroidDissector: A Static and Dynamic Analysis Tool for Android Malware Detection

DroidDissector is an extraction tool for both static and dynamic feature...
research
02/10/2020

Feature-level Malware Obfuscation in Deep Learning

We consider the problem of detecting malware with deep learning models, ...
research
12/16/2019

Learning Malware Representation based on Execution Sequences

Malware analysis has been extensively investigated as the number and typ...
research
05/13/2022

dewolf: Improving Decompilation by leveraging User Surveys

Analyzing third-party software such as malware or firmware is a crucial ...
research
07/17/2019

Dynamic Malware Analysis with Feature Engineering and Feature Learning

Dynamic malware analysis executes the program in an isolated environment...
research
09/13/2021

Malware MultiVerse: From Automatic Logic Bomb Identification to Automatic Patching and Tracing

Malware and other suspicious software often hide behaviors and component...

Please sign up or login with your details

Forgot password? Click here to reset