【24h】

PrincessLocker analysis

机译:PrincessLocker分析

获取原文

摘要

During the year 2016, ransomware continued to spread panic throughout the world. Kaspersky reported that, between January and September 2016, the rate of ransomware attacks on companies tripled from one every two minutes to one every 40 seconds with more than 62 new families of ransomware emerging. We have encountered Cerber, Locky, PrincessLocker and others. In this work, we present an analysis of PrincessLocker, a form of ransomware that first appeared some time ago and presents victims with the same ransom demand site template as Cerber did. We explain the malware analysis steps we used to characterise the PrincessLocker infection process. We also discuss self-reproduction and over-infection, two major concepts in computer virology theory. Furthermore we compare our own PrincessLocker analysis with the related work of Nolen Scaife et al. on detection of the non-malicious tool CryptoLock (not to be confused with the ransomware CryptoLocker) using behavioral analysis of information exchanges between the software under investigation and the file systems which are being encrypted.
机译:在2016年,赎金软件继续在全世界传播恐慌。卡巴斯基据报道,2016年1月至9月期间,在每隔两分钟到每40秒到每40秒的公司的赎金软件攻击率每40秒,并出现超过62个新的赎金软件。我们遇到了Cerber,Locky,PrincessLocker等。在这项工作中,我们展示了PrincessLocker的分析,这是一段时间前出现的赎金软件,并将受害者呈现与Cerber一样相同的赎金需求网站模板。我们解释了我们用于表征PrincessLocker感染过程的恶意软件分析步骤。我们还讨论了自我繁殖和过度感染,计算机病毒学理论的两个主要概念。此外,我们将自己的PrincessLocker分析与Nolen Scaife等人的相关工作进行比较。在检测到在调查中的软件与正在加密的软件之间的信息交换的行为分析检测非恶意工具Cryptolock(不与赎金软件Cryptocker)的行为分析和加密的文件系统。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号