【24h】

Large-Scale Analysis of Malware Downloaders

机译:对恶意软件下载者的大规模分析

获取原文

摘要

Downloaders are malicious programs with the goal to subversively download and install malware (eggs) on a victim's machine. In this paper, we analyze and characterize 23 Windows-based malware downloaders. We first show a high diversity in downloaders' communication architectures (e.g., P2P), carrier protocols and encryption schemes. Using dynamic malware analysis traces from over two years, we observe that 11 of these downloaders actively operated for at least one year, and identify 18 downloaders to be still active. We then describe how attackers choose resilient server infrastructures. For example, we reveal that 20% of the C&C servers remain operable on long term. Moreover, we observe steady migrations between different domains and TLD registrars, and notice attackers to deploy critical infrastructures redundantly across providers. After revealing the complexity of possible counter-measures against downloaders, we present two generic techniques enabling defenders to actively acquire malware samples. To do so, we leverage the publicly accessible downloader infrastructures by replaying download dialogs or observing a downloader's process activities from within the Windows kernel. With these two techniques, we successfully milk and analyze a diverse set of eggs from downloaders with both plain and encrypted communication channels.
机译:下载者是具有颠覆下载和安装受害者机器上的恶意软件(鸡蛋)的恶意程序。在本文中,我们分析并表征了33个基于Windows的恶意软件下载器。我们首先在下载的通信架构(例如,P2P),运营商协议和加密方案中具有高多样性。从两年内使用动态恶意软件分析迹线,我们观察到这些下载者中的11个积极运行至少一年,并识别18个下载仍处于活动状态。然后,我们描述攻击者如何选择弹性服务器基础架构。例如,我们揭示了20%的C&C服务器在长期内仍然可操作。此外,我们观察不同域和TLD注册商之间的稳定迁移,并注意攻击者在提供商中冗余地部署关键基础架构。在揭示可能对抗下载者可能的反措施的复杂性之后,我们提出了两种通用技术,使防守者能够积极获得恶意软件样本。为此,我们通过重播下载对话框或从Windows内核中观察下载的进程活动来利用公开访问的下载器基础架构。通过这两种技术,我们成功地牛奶并分析了从下滑和加密通信渠道的下载器中的各种鸡蛋。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号