Python']Python and Malware: Developing Stealth and Evasive Malware without Obfuscation

被引:1
|
作者
Koutsokostas, Vasilios [1 ]
Patsakis, Constantinos [1 ,2 ]
机构
[1] Univ Piraeus, Inst Problem Solving, Dept Informat, Piraeus, Greece
[2] Athena Res Ctr, Informat Management Syst Inst, Artemidos 6, Maroussi 15125, Greece
基金
欧盟地平线“2020”;
关键词
Malware; Antivirus; !text type='Python']Python[!/text; Evasion; Sandbox;
D O I
10.5220/0010541501250136
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With the continuous rise of malicious campaigns and the exploitation of new attack vectors, it is necessary to assess the efficacy of the defensive mechanisms used to detect them. To this end, the contribution of our work is twofold. First, it introduces a new method for obfuscating malicious code to bypass all static checks of multi-engine scanners, such as VirusTotal. Interestingly, our approach to generating the malicious executables is not based on introducing a new packer but on the augmentation of the capabilities of an existing and widely used tool for packaging Python, PyInstaller but can be used for all similar packaging tools. As we prove, the problem is deeper and inherent in almost all antivirus engines and not PyInstaller specific. Second, our work exposes significant issues of well-known sandboxes that allow malware to evade their checks. As a result, we show that stealth and evasive malware can be efficiently developed, bypassing with ease state of the art malware detection tools without raising any alert.
引用
收藏
页码:125 / 136
页数:12
相关论文
共 50 条
  • [1] Bad Snakes: Understanding and Improving Python']Python Package Index Malware Scanning
    Vu, Duc-Ly
    Newman, Zachary
    Meyers, John Speed
    [J]. 2023 IEEE/ACM 45TH INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING, ICSE, 2023, : 499 - 511
  • [2] Stealth attacks: An extended insight into the obfuscation effects on Android malware
    Maiorca, Davide
    Ariu, Davide
    Corona, Igino
    Aresu, Marco
    Giacinto, Giorgio
    [J]. COMPUTERS & SECURITY, 2015, 51 : 16 - 31
  • [3] On the Dissection of Evasive Malware
    D'Elia, Daniele Cono
    Coppa, Emilio
    Palmaro, Federico
    Cavallaro, Lorenzo
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2020, 15 : 2750 - 2765
  • [4] Obfuscation: The Hidden Malware
    O'Kane, Philip
    Sezer, Sakir
    McLaughlin, Kieran
    [J]. IEEE SECURITY & PRIVACY, 2011, 9 (05) : 41 - 47
  • [5] Use of cryptography in malware obfuscation
    Asghar, Hassan Jameel
    Zhao, Benjamin Zi Hao
    Ikram, Muhammad
    Nguyen, Giang
    Kaafar, Dali
    Lamont, Sean
    Coscia, Daniel
    [J]. JOURNAL OF COMPUTER VIROLOGY AND HACKING TECHNIQUES, 2024, 20 (01) : 135 - 152
  • [6] Use of cryptography in malware obfuscation
    Hassan Jameel Asghar
    Benjamin Zi Hao Zhao
    Muhammad Ikram
    Giang Nguyen
    Dali Kaafar
    Sean Lamont
    Daniel Coscia
    [J]. Journal of Computer Virology and Hacking Techniques, 2024, 20 : 135 - 152
  • [7] A Method for Summarizing and Classifying Evasive Malware
    Yin, Haikuo
    Lou, Brandon
    Reiher, Peter
    [J]. PROCEEDINGS OF THE 26TH INTERNATIONAL SYMPOSIUM ON RESEARCH IN ATTACKS, INTRUSIONS AND DEFENSES, RAID 2023, 2023, : 455 - 470
  • [8] Evasive Malware via Identifier Implanting
    Tanabe, Rui
    Ueno, Wataru
    Ishii, Kou
    Yoshioka, Katsunari
    Matsumoto, Tsutomu
    Kasama, Takahiro
    Inoue, Daisuke
    Rossow, Christian
    [J]. DETECTION OF INTRUSIONS AND MALWARE, AND VULNERABILITY ASSESSMENT, DIMVA 2018, 2018, 10885 : 162 - 184
  • [9] Developing Sherpa with Python']Python
    Doe, S.
    Nguyen, D.
    Stawarz, C.
    Refsdal, B.
    Siemiginowska, A.
    Burke, D.
    Evans, I.
    Evans, J.
    McDowell, J.
    Houck, J.
    Nowak, M.
    [J]. ASTRONOMICAL DATA ANALYSIS SOFTWARE AND SYSTEMS XVI, 2007, 376 : 543 - +
  • [10] Proposed Classification of Malware, Based on Obfuscation
    Barria, Cristian
    Cubillos, Claudio
    Cordero, David
    Palma, Miguel
    [J]. 2016 6TH INTERNATIONAL CONFERENCE ON COMPUTERS COMMUNICATIONS AND CONTROL (ICCCC), 2016, : 37 - 44