【24h】

Mining malware secrets

机译:挖掘恶意软件秘密

获取原文

摘要

Malware analysts, besides being tasked to create signatures, are also called upon to generate indicators of compromise, to disrupt botnets, to attribute an attack to an actor, and to understand the adversary's intent. This requires extracting from malware a variety of secrets, aka threat intelligence. After studying a few samples from a malware family and locating where its secrets are embedded, analysts create rules that may be used to automatically extract threat intelligence from malware variants in the future. Rules to extract secrets from malware are today written as regular expressions over bytecodes, such as using Yara. These rules are easily invalidated by polymorphic variants or evolutionary versions. Keeping the rules updated is a maintenance challenge for malware analysts. Instead of using bytecode, we present the use of code semantics to create rules to extract malware secrets. The semantics of code captures the effect of instructions on the registers and memory. Rules written using the structure of the symbolic content of registers and memory, instead of bytecode, are more resilient to code transformation and evolutionary changes, and are thus less brittle and easier to maintain.
机译:恶意软件分析师除了任务创建签名之外,还被要求生成妥协指标,以破坏僵尸网络,将攻击归因于演员,并了解对手的意图。这需要从恶意软件中提取各种秘密,AKA威胁情报。在研究来自恶意软件家庭的一些样本并定位其秘密的位置之后,分析师创建了可用于自动从未来从恶意软件变体中提取威胁情报的规则。从恶意软件中提取秘密的规则今天被写为常规表达式,例如使用yara。这些规则很容易被多态性变体或进化版本无效。保持规则更新是恶意软件分析师的维护挑战。我们介绍了使用代码语义来创建规则以提取恶意软件秘密的规则。代码的语义捕获了寄存器和内存上的指令的效果。使用寄存器和内存的符号内容的结构写入的规则,而不是字节码,更具弹性转换和进化的变化,因此不太脆弱,更容易维护。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号