【24h】

Mining malware secrets

机译:挖掘恶意软件秘密

获取原文

摘要

Malware analysts, besides being tasked to create signatures, are also called upon to generate indicators of compromise, to disrupt botnets, to attribute an attack to an actor, and to understand the adversary's intent. This requires extracting from malware a variety of secrets, aka threat intelligence. After studying a few samples from a malware family and locating where its secrets are embedded, analysts create rules that may be used to automatically extract threat intelligence from malware variants in the future. Rules to extract secrets from malware are today written as regular expressions over bytecodes, such as using Yara. These rules are easily invalidated by polymorphic variants or evolutionary versions. Keeping the rules updated is a maintenance challenge for malware analysts. Instead of using bytecode, we present the use of code semantics to create rules to extract malware secrets. The semantics of code captures the effect of instructions on the registers and memory. Rules written using the structure of the symbolic content of registers and memory, instead of bytecode, are more resilient to code transformation and evolutionary changes, and are thus less brittle and easier to maintain.
机译:恶意软件分析人员除承担创建签名的任务外,还被要求生成危害指标,破坏僵尸网络,将攻击归因于参与者并了解对手的意图。这需要从恶意软件中提取各种秘密,也就是威胁情报。在研究了来自恶意软件家族的一些样本并确定了其秘密的嵌入位置之后,分析人员创建了可用于将来自动从恶意软件变体中提取威胁情报的规则。如今,从恶意软件中提取秘密的规则已写成字节码的正则表达式,例如使用Yara。这些规则很容易因多态变体或进化版本而失效。对于恶意软件分析师而言,保持规则更新是一项维护挑战。我们提供了使用代码语义来创建规则以提取恶意软件机密的方法,而不是使用字节码。代码的语义捕获了指令对寄存器和存储器的影响。使用寄存器和存储器的符号内容的结构而不是字节码编写的规则对代码转换和演化更改更具弹性,因此不那么脆弱,更易于维护。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号