SlideShare a Scribd company logo
1 of 71
Download to read offline
Study on Automatically Evading
Malware Detection
@RAT資安小聚 2018.3.25
<ajblane0612@gmail.com>
AjMaChInE
Who Am I
• @若渴
– https://www.slideshare.net/aj0612
• Geek
• Freelancer
• FB
你有沒有遇過payload generator (e.g.
Metaploit’s MsfVenom) 產生的
(reverse) shell 被Antivirus偵測到?
Outline
Machine Learning (ML)
Malware Detection Methods
Signature based Behavior based Heuristic based
System call CFG …
emulator monitorVirtual machine
sandbox
Signature-Based Detection
This technique searches sequences of bytes in
order to identify a particular piece of malicious
software. A signature is composed of a
particular sequence of code or data. This
signature is stored on a database which is used
to compare to the scanned files. This is the most
common method used to detect malware, since
it produces a small error rate.
[0]
Evading Signature-Based Detection
Obfuscation-based malware
• Encryption
– Oligomorphism
• Polymorphism
• Metamorphism
• Compiler-based
– Dead-code insertion, Register reassignment,
Subroutine reordering, Code transportation, etc..
• … [0][1]
Evading Signature-Based Detection
- Encryption
[2]
malware in memory
Encryption Methods
• Exclusive OR (XOR)
• ROT13
• Base64 encoding
• AES
• Code Packing
• …
• Oligomorphism
– The purpose of this technique is to produce a
different decryptor on every new infection.
[0][19]
假設Encryption Methods產生出的
bin都被antivirus識別且建立出
signature那怎辦?
改變實作架構
• Veil framework [8]
– Encode/decode
– Obfuscation
– Non-standard language
• python, ruby, Perl, go, etc.
• Reflective PE Packer [2][3]
• SpookFlare: Stay in Shadows [4]
• …
Reflective PE Packer
• Reflective: Implementing a “minimal” Portable
Executable (PE) file “loader”
• stub -> loader-> malware
– 2014, Arne Swinnen [2]
– AMBER [3]
2014, Arne Swinnen [2]
2014, Arne Swinnen [2]
.code
JIT compiler ?
2014, Arne Swinnen [2]
AMBER [3]
Multi stage payload attack model
Stub (and Malware) Stealthy -
Inline Packer [2]
Stub
Stealthy –
New Packer
[2]
Stub Stealthy – Resource Packer [2]
[2]
SpookFlare [4]
• Code Document Object Model (CodeDOM)
Evading Signature-Based
Detection - Polymorphism
Return-Oriented Programming as a polymorphism alternative [5]
Evading Signature-Based Detection
- Metamorphsm
• VM-based malware
Signature-Based AV is Dead
Machine Learning (ML)
Malware Detection Methods
Signature based Behavior based Heuristic based
System call CFG …
emulator monitorVirtual machine
sandbox
Behavior-Based Detection
A behavior-based detector basically consists of the
following components
• Data Collector
– This component collects dynamic / static information
about the execution
• Interpreter
– This component converts raw information collected by
data collection module into intermediate representations
• Matcher
– It is used to compare this representation with the
behavior signatures [7]
The Main Advantage of the
Behavior-Based Detection
“is the ability to detect the type of malwares
that signature base techniques are unable to
detect such as unknown and polymorphic
(behavior) malware variants. On the other hand,
non-availability of promising False Positive Ratio
(FPR) and also high amount of scanning
(database) time are the main disadvantages of
these behavior based malware detection
methods”
[7]
Improving Detection Performance
Machine Learning (ML)
Malware Detection Methods
Signature based Behavior based Heuristic based
System call CFG …
emulator monitorVirtual machine
sandbox
Using Behavior-based or Heuristic-based
Detection After running malware ?
NO
Running the Malware inside with
Isolation and Monitor (Golden Image)
Machine Learning (ML)
Malware Detection Methods
Signature based Behavior based Heuristic based
System call CFG …
emulator monitorVirtual machine
sandbox
The AV Detection Flow
with Isolation and Monitor
“The principle is executing the malware inside a
controlled environment in order to trigger the
unpacking of the executable in memory, detect the end
of the unpacking process by either using automated
unpacker or by monitoring the execution of writable
memory sections. Once the unpacking process is
detected, the collected data is re-run using Static-based
analysis or fed to the heuristic engine. “
– Cuckoo sandbox (open source)
– …
[2]
Inline API Hooks for Sandbox
sandbox
sandbox
[9]
Notes of The AV with Isolation and
Monitor
• Where to trigger the malware
• Sandbox monitors software behavior in an
isolation environment implemented by using
emulator-based or hardware virtualization-
based methods (Isolation)
Evading an Isolation Environment
• AV detector (Detect sandbox-inherent
characteristics)
• Detect virtualization
[11]
Evading an Isolation Environment-
AV Detector
main(){
…
If ( AV is detected)
{
call main();
} else
{
decrpt();
run_malware();
}
One of Concepts of Implementing
AV Detector
Fingerprinting sandboxes
[12]
Categories of Fingerprinting
Sandboxes
• Timing
– sandboxes only run the file a limited time
• File
– e.g. The number of installed programs are examined by a
test case utilizing the Windows registry, as well as the
number of recently modified files - which are expected to
be none at a sandbox
• Process
– e.g. running processes will be less compared to regular
clients (clean installations of Windows)
• CPU instruction
– e.g. Incorrectly emulated instructions [9]
Categories of Fingerprinting
Sandboxes
• Environment
– e.g. users are expected to have password protected their accounts
while sandboxes most likely have not
• Hardware
– e.g. resources are expected to be higher on a user client than on a
sandbox running inside a virtual machine.
• Network
– e.g. the attacker reads the data returned and checks the first four
bytes of the return to find "<!do". This string is likely the "<!doctype
html>" tag that is found at the start of the Google website (and others).
I checked a few sandbox programs that try to mimic the Internet and
most of them just serve up an HTML page without the "<!doctype
html>" tag.
• … [9][13]
Building Environment-based
Malware [9][10]
Resource packing
“Since the sandboxes were treated as black
boxes during the tests, no research could be
done” [9]
可發揮的地方e.g. [14]
AjMaChInE: 或許可以建立heuristic method
P: AV Detector非常強悍
S: “Facing the problem of evasion, researchers
proposed new techniques to analyze the hidden
behavior of evasive malware. A generic approach
to counter evasive behavior is exploring multiple
execution paths” [11] e.g. turn a greater-than
operation to a less-or-equal => 修改conditional
branches
但是[11]
Overcoming these approaches by converting
conditional branches to indirect jumps/calls
使用 Symbolic Execution Multiple
Execution Paths會比較好嗎 ?
The Disadvantage of Symbolic
Execution [15]
• Limitation of symbolic execution in unrolling
loops
– Typically, only a fixed number of times or a fixed
amount of time is spent to approximate the
analysis
• Unsolved conjectures
– are unproven propositions or theorems that
appear to be correct and have not been disproven
– e.g. 3x + 1 conjecture, 5x+1 conjecture, 7x+1
conjecture, Matthews conjecture, Juggler
sequence, etc..
Obfuscated Code of 3x + 1
Conjecture [15]
Evading an Isolation Environment-
Detect Virtualization [11]
Evading an Isolation Environment-
Detect Virtualization [11]
Evading an Isolation Environment-
Detect Virtualization [11]
Evading an Isolation Environment-
Detect Virtualization [11]
A Triggered Trick[5]
那假設Sandbox 觸發了Malware而進行
System-Call-based Behavior Analysis
Malware Specification for System-
Call-Behavior [16]
Malware specification graph of download-
execution: recv ∧ open → write → exec
最簡單想法自幹Minimal API
Minimal API
sandbox?
Architecture of Shadow Attacks [16]
Shadow Process Coordination/Communication (SPC)
• Side channel
• Covert cache
• Branch predictor
• Inter-Process Communication (IPC)
Shadow Attacks可能會被Data
Flow Analysis分析到
Hiding Local SPC through Remote
Network Coordination
Mixed, Indirect, Implicit SPC Chain
SPC就是用很複雜就對了。
Shadow Attacks會有太多Processes,
於是Replacement Attacks [17]
Replacement Attack Arsenal
• Inserting redundant dependencies
• Sub-System Call Data Graph mutations
Replacement Attack Arsenal -
Inserting Redundant Dependencies
• “NtSetInformationFile” can replace the
dependencies with FileHandle as medium, which has
been illustrated in above Fig.
• “NtDuplicateObject” returns a duplicated object
handle, which refers to the same object as the
original handle.
• The medium of “void *address”, we can insert
“NtQueryVirtualMemory” or
“NtReadVirtualMemory”, which do not affect the
mapped memory address.
Replacement Attack Arsenal -
Inserting Redundant Dependencies
• “NtQuery*” attack. There are several windows native APIs for
querying information of kernel objects, such as
“NtQueryAttributesFile”, “NtQueryKey”,
“NtQueryInformationProcess” and “NtQueryInformationFile”.
All of these query APIs take certain object handle as one of
input argument and output object information. No any
modification is introduced to the kernel objects. Hence
“NtQuery*” native APIs are good candidates for our
replacement attacks.
– For example,
• NtCreateFile → NtSetInformationFile
• NtCreateFile → NtQueryInformationFile” (“FileInformation”) ->
NtSetInformationFile
Replacement Attack Arsenal - Sub-
SCDG mutations
• Replication (複製行為). For example, we can
copy a file by calling “NtReadFile” and
“NtWriteFile” instead of using memory as
medium
• Modify registry for persistence [18]
• Code remote injection
• 就是改程式碼以及架構。
The Example of Sub-SCDG Mutations
Sub-SCDG mutations
I Love the Ideal about API Replacer
Bot vs. Bot–Malware Detection [21]
Bot vs. Bot–Malware Detection [21]
Bot vs. Bot–Malware Evading [21]
如果沒有分數
資訊?
Evading Bot Malware Detection via
Reinforcement Learning [21]
目前Bot vs. Bot 看到就只是處理
signature對決,還沒看到behavior
evading處理。
Cat-and-Mouse Game
• AjMaChInE: unknown techniques (無限可能)
> know,所以我不相信AV可利用AI來解決。
– Signature-based is dead
– AV detector非常強悍
– Evade system-call-based behavior analysis
• 社群朋友: 防守AI加入直覺
Reference
• [0] 2017, Jhonattan J. Barriga A, etc. “Malware Detection and Evasion with
Machine Learning Techniques: A Survey”
• [1] 2018, Andrea Fortuna, “Malware hiding and evasion techniques”
• [2] 2014, Arne Swinnen, etc. “One packer to rule them all: Empirical
identification, comparison and circumvention of current Antivirus
detection techniques”,
• [3] 2017, “AMBER: Reflective PE Packer”,
https://github.com/EgeBalci/Amber
• *4+ 2017, “SpookFlare: Stay in Shadows”,
https://artofpwn.com/spookflare.html
• [5] 2015, “Advanced Antivirus Evasion Techniques”,
https://github.com/gpoulios/ROPInjector
• [6] 2018, Tim Blazytko, etc. “Breaking State-of-the-Art Binary Code
Obfuscation A Program Synthesis-based Approach”
Reference
• [7] 2013, Zahra Bazrafshan, etc. “A Survey on Heuristic Malware Detection
Techniques”
• [8] 2016, Ctruncer, ”The Art of AV Evasion - or Lack Thereof ”
• [9] 2016, Gustav Lundsgard, etc. “Bypassing modern sandobx technologies:
An experiment on sandbox evasion techniques”
• [10] 2016, Jeremy Blackthorne, etc. “AVLeak: Fingerprinting Antivirus
Emulators Through Black-Box Testing”
• [11] 2016, Michael Brengel, etc. “Detecting Hardware-Assisted
Virtualization”
• [12] 2016, Michael Brengel etc. , “Evading Malware Sandboxes”
• [13] 2017, MalwareJake, “Novel malware sandbox evasion”
• [14] 2017. “Spotless Sandboxes: Evading Malware Analysis Systems using
Wear-and-Tear Artifacts”
Reference
• [15] 2011, Zhi Wang, etc. “Linear Obfuscation to Combat Symbolic
Execution”
• [16] 2012, Weiqin Ma, etc. “Shadow Attacks: Automatically Evading
System-Call-Behavior Based Malware Detection”
• [17] 2015, Jiang Ming, etc. “Replacement Attacks: Automatically Impeding
Behavior-based Malware Specifications”
• [18] 2013, Scott Langendorf “Windows registry persistence, part 2: The
run keys and search-order”
• *19+ 2016, Andrea Fortuna, etc. “Malware obfuscation techniques: four
simple examples”
• [20] 2017, Kristian Iliev, etc. “Top 6 Advanced Obfuscation Techniques
Hiding Malware on Your Device”
• [21] 2017, Hyrum S. Anderson, etc. “Evading Machine Learning Malware
Detection”

More Related Content

What's hot

BlueHat v18 || Improving security posture through increased agility with meas...
BlueHat v18 || Improving security posture through increased agility with meas...BlueHat v18 || Improving security posture through increased agility with meas...
BlueHat v18 || Improving security posture through increased agility with meas...BlueHat Security Conference
 
Automating Analysis and Exploitation of Embedded Device Firmware
Automating Analysis and Exploitation of Embedded Device FirmwareAutomating Analysis and Exploitation of Embedded Device Firmware
Automating Analysis and Exploitation of Embedded Device FirmwareMalachi Jones
 
Virtual Machine Introspection - Future of the Cloud
Virtual Machine Introspection - Future of the CloudVirtual Machine Introspection - Future of the Cloud
Virtual Machine Introspection - Future of the CloudTjylen Veselyj
 
The Lambda Defense Functional Paradigms for Cyber Security
The Lambda Defense Functional Paradigms for Cyber SecurityThe Lambda Defense Functional Paradigms for Cyber Security
The Lambda Defense Functional Paradigms for Cyber SecurityRod Soto
 
BlueHat v17 || Extracting Secrets from Silicon – A New Generation of Bug Hunt...
BlueHat v17 || Extracting Secrets from Silicon – A New Generation of Bug Hunt...BlueHat v17 || Extracting Secrets from Silicon – A New Generation of Bug Hunt...
BlueHat v17 || Extracting Secrets from Silicon – A New Generation of Bug Hunt...BlueHat Security Conference
 
Applying Provenance in APT Monitoring and Analysis Practical Challenges for S...
Applying Provenance in APT Monitoring and Analysis Practical Challenges for S...Applying Provenance in APT Monitoring and Analysis Practical Challenges for S...
Applying Provenance in APT Monitoring and Analysis Practical Challenges for S...Graeme Jenkinson
 
Automated In-memory Malware/Rootkit Detection via Binary Analysis and Machin...
Automated In-memory Malware/Rootkit  Detection via Binary Analysis and Machin...Automated In-memory Malware/Rootkit  Detection via Binary Analysis and Machin...
Automated In-memory Malware/Rootkit Detection via Binary Analysis and Machin...Malachi Jones
 
BlueHat v18 || Crafting synthetic attack examples from past cyber-attacks for...
BlueHat v18 || Crafting synthetic attack examples from past cyber-attacks for...BlueHat v18 || Crafting synthetic attack examples from past cyber-attacks for...
BlueHat v18 || Crafting synthetic attack examples from past cyber-attacks for...BlueHat Security Conference
 
The Heatmap
 - Why is Security Visualization so Hard?
The Heatmap
 - Why is Security Visualization so Hard?The Heatmap
 - Why is Security Visualization so Hard?
The Heatmap
 - Why is Security Visualization so Hard?Raffael Marty
 
Code review for secure web applications
Code review for secure web applicationsCode review for secure web applications
Code review for secure web applicationssilviad74
 
Self-defending software: Automatically patching errors in deployed software ...
Self-defending software: Automatically patching  errors in deployed software ...Self-defending software: Automatically patching  errors in deployed software ...
Self-defending software: Automatically patching errors in deployed software ...Sung Kim
 
Analysis Of Adverarial Code - The Role of Malware Kits
Analysis Of Adverarial Code - The Role of Malware KitsAnalysis Of Adverarial Code - The Role of Malware Kits
Analysis Of Adverarial Code - The Role of Malware KitsRahul Mohandas
 
Understand How Machine Learning Defends Against Zero-Day Threats
Understand How Machine Learning Defends Against Zero-Day ThreatsUnderstand How Machine Learning Defends Against Zero-Day Threats
Understand How Machine Learning Defends Against Zero-Day ThreatsRahul Mohandas
 
Using Static Binary Analysis To Find Vulnerabilities And Backdoors in Firmware
Using Static Binary Analysis To Find Vulnerabilities And Backdoors in FirmwareUsing Static Binary Analysis To Find Vulnerabilities And Backdoors in Firmware
Using Static Binary Analysis To Find Vulnerabilities And Backdoors in FirmwareLastline, Inc.
 
The Heatmap
 - Why is Security Visualization so Hard?
The Heatmap
 - Why is Security Visualization so Hard?The Heatmap
 - Why is Security Visualization so Hard?
The Heatmap
 - Why is Security Visualization so Hard?Raffael Marty
 

What's hot (20)

L27
L27L27
L27
 
BlueHat v18 || Improving security posture through increased agility with meas...
BlueHat v18 || Improving security posture through increased agility with meas...BlueHat v18 || Improving security posture through increased agility with meas...
BlueHat v18 || Improving security posture through increased agility with meas...
 
Automating Analysis and Exploitation of Embedded Device Firmware
Automating Analysis and Exploitation of Embedded Device FirmwareAutomating Analysis and Exploitation of Embedded Device Firmware
Automating Analysis and Exploitation of Embedded Device Firmware
 
Virtual Machine Introspection - Future of the Cloud
Virtual Machine Introspection - Future of the CloudVirtual Machine Introspection - Future of the Cloud
Virtual Machine Introspection - Future of the Cloud
 
The Lambda Defense Functional Paradigms for Cyber Security
The Lambda Defense Functional Paradigms for Cyber SecurityThe Lambda Defense Functional Paradigms for Cyber Security
The Lambda Defense Functional Paradigms for Cyber Security
 
.NET for hackers
.NET for hackers.NET for hackers
.NET for hackers
 
Spectre & Meltdown
Spectre & MeltdownSpectre & Meltdown
Spectre & Meltdown
 
Secure Coding in C/C++
Secure Coding in C/C++Secure Coding in C/C++
Secure Coding in C/C++
 
BlueHat v17 || Extracting Secrets from Silicon – A New Generation of Bug Hunt...
BlueHat v17 || Extracting Secrets from Silicon – A New Generation of Bug Hunt...BlueHat v17 || Extracting Secrets from Silicon – A New Generation of Bug Hunt...
BlueHat v17 || Extracting Secrets from Silicon – A New Generation of Bug Hunt...
 
Applying Provenance in APT Monitoring and Analysis Practical Challenges for S...
Applying Provenance in APT Monitoring and Analysis Practical Challenges for S...Applying Provenance in APT Monitoring and Analysis Practical Challenges for S...
Applying Provenance in APT Monitoring and Analysis Practical Challenges for S...
 
Automated In-memory Malware/Rootkit Detection via Binary Analysis and Machin...
Automated In-memory Malware/Rootkit  Detection via Binary Analysis and Machin...Automated In-memory Malware/Rootkit  Detection via Binary Analysis and Machin...
Automated In-memory Malware/Rootkit Detection via Binary Analysis and Machin...
 
BlueHat v18 || Crafting synthetic attack examples from past cyber-attacks for...
BlueHat v18 || Crafting synthetic attack examples from past cyber-attacks for...BlueHat v18 || Crafting synthetic attack examples from past cyber-attacks for...
BlueHat v18 || Crafting synthetic attack examples from past cyber-attacks for...
 
The Heatmap
 - Why is Security Visualization so Hard?
The Heatmap
 - Why is Security Visualization so Hard?The Heatmap
 - Why is Security Visualization so Hard?
The Heatmap
 - Why is Security Visualization so Hard?
 
Code review for secure web applications
Code review for secure web applicationsCode review for secure web applications
Code review for secure web applications
 
Self-defending software: Automatically patching errors in deployed software ...
Self-defending software: Automatically patching  errors in deployed software ...Self-defending software: Automatically patching  errors in deployed software ...
Self-defending software: Automatically patching errors in deployed software ...
 
Analysis Of Adverarial Code - The Role of Malware Kits
Analysis Of Adverarial Code - The Role of Malware KitsAnalysis Of Adverarial Code - The Role of Malware Kits
Analysis Of Adverarial Code - The Role of Malware Kits
 
Understand How Machine Learning Defends Against Zero-Day Threats
Understand How Machine Learning Defends Against Zero-Day ThreatsUnderstand How Machine Learning Defends Against Zero-Day Threats
Understand How Machine Learning Defends Against Zero-Day Threats
 
Using Static Binary Analysis To Find Vulnerabilities And Backdoors in Firmware
Using Static Binary Analysis To Find Vulnerabilities And Backdoors in FirmwareUsing Static Binary Analysis To Find Vulnerabilities And Backdoors in Firmware
Using Static Binary Analysis To Find Vulnerabilities And Backdoors in Firmware
 
Careful Packing
Careful PackingCareful Packing
Careful Packing
 
The Heatmap
 - Why is Security Visualization so Hard?
The Heatmap
 - Why is Security Visualization so Hard?The Heatmap
 - Why is Security Visualization so Hard?
The Heatmap
 - Why is Security Visualization so Hard?
 

Similar to [RAT資安小聚] Study on Automatically Evading Malware Detection

B-Sides Seattle 2012 Offensive Defense
B-Sides Seattle 2012 Offensive DefenseB-Sides Seattle 2012 Offensive Defense
B-Sides Seattle 2012 Offensive DefenseStephan Chenette
 
"Automated Malware Analysis" de Gabriel Negreira Barbosa, Malware Research an...
"Automated Malware Analysis" de Gabriel Negreira Barbosa, Malware Research an..."Automated Malware Analysis" de Gabriel Negreira Barbosa, Malware Research an...
"Automated Malware Analysis" de Gabriel Negreira Barbosa, Malware Research an...SegInfo
 
The Future of Automated Malware Generation
The Future of Automated Malware GenerationThe Future of Automated Malware Generation
The Future of Automated Malware GenerationStephan Chenette
 
TENTACLE: Environment-Sensitive Malware Palpation(PacSec 2014)
TENTACLE: Environment-Sensitive Malware Palpation(PacSec 2014)TENTACLE: Environment-Sensitive Malware Palpation(PacSec 2014)
TENTACLE: Environment-Sensitive Malware Palpation(PacSec 2014)FFRI, Inc.
 
Simseer and Bugwise - Web Services for Binary-level Software Similarity and D...
Simseer and Bugwise - Web Services for Binary-level Software Similarity and D...Simseer and Bugwise - Web Services for Binary-level Software Similarity and D...
Simseer and Bugwise - Web Services for Binary-level Software Similarity and D...Silvio Cesare
 
Syed Ubaid Ali Jafri - Black Box Penetration testing for Associates
Syed Ubaid Ali Jafri - Black Box Penetration testing for AssociatesSyed Ubaid Ali Jafri - Black Box Penetration testing for Associates
Syed Ubaid Ali Jafri - Black Box Penetration testing for AssociatesSyed Ubaid Ali Jafri
 
Owasp mobile top 10
Owasp mobile top 10Owasp mobile top 10
Owasp mobile top 10Pawel Rzepa
 
Detecting Web Browser Heap Corruption Attacks - Stephan Chenette, Moti Joseph...
Detecting Web Browser Heap Corruption Attacks - Stephan Chenette, Moti Joseph...Detecting Web Browser Heap Corruption Attacks - Stephan Chenette, Moti Joseph...
Detecting Web Browser Heap Corruption Attacks - Stephan Chenette, Moti Joseph...Stephan Chenette
 
how-to-bypass-AM-PPL
how-to-bypass-AM-PPLhow-to-bypass-AM-PPL
how-to-bypass-AM-PPLnitinscribd
 
Metasploit Computer security testing tool
Metasploit  Computer security testing toolMetasploit  Computer security testing tool
Metasploit Computer security testing toolmedoelkang600
 
Unsafe Deserialization Attacks In Java and A New Approach To Protect The JVM ...
Unsafe Deserialization Attacks In Java and A New Approach To Protect The JVM ...Unsafe Deserialization Attacks In Java and A New Approach To Protect The JVM ...
Unsafe Deserialization Attacks In Java and A New Approach To Protect The JVM ...Apostolos Giannakidis
 
RIoT (Raiding Internet of Things) by Jacob Holcomb
RIoT  (Raiding Internet of Things)  by Jacob HolcombRIoT  (Raiding Internet of Things)  by Jacob Holcomb
RIoT (Raiding Internet of Things) by Jacob HolcombPriyanka Aash
 
Inside the Matrix,How to Build Transparent Sandbox for Malware Analysis
Inside the Matrix,How to Build Transparent Sandbox for Malware AnalysisInside the Matrix,How to Build Transparent Sandbox for Malware Analysis
Inside the Matrix,How to Build Transparent Sandbox for Malware AnalysisChong-Kuan Chen
 
Anti-virus Mechanisms and Various Ways to Bypass Antivirus detection
Anti-virus Mechanisms and Various Ways to Bypass Antivirus detectionAnti-virus Mechanisms and Various Ways to Bypass Antivirus detection
Anti-virus Mechanisms and Various Ways to Bypass Antivirus detectionNeel Pathak
 
Current Topics paper A4 submission 4.30.2015 Master Copy
Current Topics paper A4 submission 4.30.2015 Master CopyCurrent Topics paper A4 submission 4.30.2015 Master Copy
Current Topics paper A4 submission 4.30.2015 Master CopyTommie Walls
 
Watch How The Giants Fall: Learning from Bug Bounty Results
Watch How The Giants Fall: Learning from Bug Bounty ResultsWatch How The Giants Fall: Learning from Bug Bounty Results
Watch How The Giants Fall: Learning from Bug Bounty Resultsjtmelton
 
FBI & Secret Service- Business Email Compromise Workshop
FBI & Secret Service- Business Email Compromise WorkshopFBI & Secret Service- Business Email Compromise Workshop
FBI & Secret Service- Business Email Compromise WorkshopErnest Staats
 
How to break web applications
How to break web applicationsHow to break web applications
How to break web applicationsDinis Cruz
 
Defcon 22-wesley-mc grew-instrumenting-point-of-sale-malware
Defcon 22-wesley-mc grew-instrumenting-point-of-sale-malwareDefcon 22-wesley-mc grew-instrumenting-point-of-sale-malware
Defcon 22-wesley-mc grew-instrumenting-point-of-sale-malwarePriyanka Aash
 

Similar to [RAT資安小聚] Study on Automatically Evading Malware Detection (20)

B-Sides Seattle 2012 Offensive Defense
B-Sides Seattle 2012 Offensive DefenseB-Sides Seattle 2012 Offensive Defense
B-Sides Seattle 2012 Offensive Defense
 
"Automated Malware Analysis" de Gabriel Negreira Barbosa, Malware Research an...
"Automated Malware Analysis" de Gabriel Negreira Barbosa, Malware Research an..."Automated Malware Analysis" de Gabriel Negreira Barbosa, Malware Research an...
"Automated Malware Analysis" de Gabriel Negreira Barbosa, Malware Research an...
 
The Future of Automated Malware Generation
The Future of Automated Malware GenerationThe Future of Automated Malware Generation
The Future of Automated Malware Generation
 
TENTACLE: Environment-Sensitive Malware Palpation(PacSec 2014)
TENTACLE: Environment-Sensitive Malware Palpation(PacSec 2014)TENTACLE: Environment-Sensitive Malware Palpation(PacSec 2014)
TENTACLE: Environment-Sensitive Malware Palpation(PacSec 2014)
 
Simseer and Bugwise - Web Services for Binary-level Software Similarity and D...
Simseer and Bugwise - Web Services for Binary-level Software Similarity and D...Simseer and Bugwise - Web Services for Binary-level Software Similarity and D...
Simseer and Bugwise - Web Services for Binary-level Software Similarity and D...
 
Syed Ubaid Ali Jafri - Black Box Penetration testing for Associates
Syed Ubaid Ali Jafri - Black Box Penetration testing for AssociatesSyed Ubaid Ali Jafri - Black Box Penetration testing for Associates
Syed Ubaid Ali Jafri - Black Box Penetration testing for Associates
 
Effectiveness of AV in Detecting Web Application Backdoors
Effectiveness of AV in Detecting Web Application BackdoorsEffectiveness of AV in Detecting Web Application Backdoors
Effectiveness of AV in Detecting Web Application Backdoors
 
Owasp mobile top 10
Owasp mobile top 10Owasp mobile top 10
Owasp mobile top 10
 
Detecting Web Browser Heap Corruption Attacks - Stephan Chenette, Moti Joseph...
Detecting Web Browser Heap Corruption Attacks - Stephan Chenette, Moti Joseph...Detecting Web Browser Heap Corruption Attacks - Stephan Chenette, Moti Joseph...
Detecting Web Browser Heap Corruption Attacks - Stephan Chenette, Moti Joseph...
 
how-to-bypass-AM-PPL
how-to-bypass-AM-PPLhow-to-bypass-AM-PPL
how-to-bypass-AM-PPL
 
Metasploit Computer security testing tool
Metasploit  Computer security testing toolMetasploit  Computer security testing tool
Metasploit Computer security testing tool
 
Unsafe Deserialization Attacks In Java and A New Approach To Protect The JVM ...
Unsafe Deserialization Attacks In Java and A New Approach To Protect The JVM ...Unsafe Deserialization Attacks In Java and A New Approach To Protect The JVM ...
Unsafe Deserialization Attacks In Java and A New Approach To Protect The JVM ...
 
RIoT (Raiding Internet of Things) by Jacob Holcomb
RIoT  (Raiding Internet of Things)  by Jacob HolcombRIoT  (Raiding Internet of Things)  by Jacob Holcomb
RIoT (Raiding Internet of Things) by Jacob Holcomb
 
Inside the Matrix,How to Build Transparent Sandbox for Malware Analysis
Inside the Matrix,How to Build Transparent Sandbox for Malware AnalysisInside the Matrix,How to Build Transparent Sandbox for Malware Analysis
Inside the Matrix,How to Build Transparent Sandbox for Malware Analysis
 
Anti-virus Mechanisms and Various Ways to Bypass Antivirus detection
Anti-virus Mechanisms and Various Ways to Bypass Antivirus detectionAnti-virus Mechanisms and Various Ways to Bypass Antivirus detection
Anti-virus Mechanisms and Various Ways to Bypass Antivirus detection
 
Current Topics paper A4 submission 4.30.2015 Master Copy
Current Topics paper A4 submission 4.30.2015 Master CopyCurrent Topics paper A4 submission 4.30.2015 Master Copy
Current Topics paper A4 submission 4.30.2015 Master Copy
 
Watch How The Giants Fall: Learning from Bug Bounty Results
Watch How The Giants Fall: Learning from Bug Bounty ResultsWatch How The Giants Fall: Learning from Bug Bounty Results
Watch How The Giants Fall: Learning from Bug Bounty Results
 
FBI & Secret Service- Business Email Compromise Workshop
FBI & Secret Service- Business Email Compromise WorkshopFBI & Secret Service- Business Email Compromise Workshop
FBI & Secret Service- Business Email Compromise Workshop
 
How to break web applications
How to break web applicationsHow to break web applications
How to break web applications
 
Defcon 22-wesley-mc grew-instrumenting-point-of-sale-malware
Defcon 22-wesley-mc grew-instrumenting-point-of-sale-malwareDefcon 22-wesley-mc grew-instrumenting-point-of-sale-malware
Defcon 22-wesley-mc grew-instrumenting-point-of-sale-malware
 

More from Aj MaChInE

An Intro on Data-oriented Attacks
An Intro on Data-oriented AttacksAn Intro on Data-oriented Attacks
An Intro on Data-oriented AttacksAj MaChInE
 
A Study on .NET Framework for Red Team - Part I
A Study on .NET Framework for Red Team - Part IA Study on .NET Framework for Red Team - Part I
A Study on .NET Framework for Red Team - Part IAj MaChInE
 
[若渴] A preliminary study on attacks against consensus in bitcoin
[若渴] A preliminary study on attacks against consensus in bitcoin[若渴] A preliminary study on attacks against consensus in bitcoin
[若渴] A preliminary study on attacks against consensus in bitcoinAj MaChInE
 
[若渴] Preliminary Study on Design and Exploitation of Trustzone
[若渴] Preliminary Study on Design and Exploitation of Trustzone[若渴] Preliminary Study on Design and Exploitation of Trustzone
[若渴] Preliminary Study on Design and Exploitation of TrustzoneAj MaChInE
 
[若渴]Study on Side Channel Attacks and Countermeasures
[若渴]Study on Side Channel Attacks and Countermeasures [若渴]Study on Side Channel Attacks and Countermeasures
[若渴]Study on Side Channel Attacks and Countermeasures Aj MaChInE
 
[若渴計畫] Challenges and Solutions of Window Remote Shellcode
[若渴計畫] Challenges and Solutions of Window Remote Shellcode[若渴計畫] Challenges and Solutions of Window Remote Shellcode
[若渴計畫] Challenges and Solutions of Window Remote ShellcodeAj MaChInE
 
[若渴計畫] Introduction: Formal Verification for Code
[若渴計畫] Introduction: Formal Verification for Code[若渴計畫] Introduction: Formal Verification for Code
[若渴計畫] Introduction: Formal Verification for CodeAj MaChInE
 
[若渴計畫] Studying ASLR^cache
[若渴計畫] Studying ASLR^cache[若渴計畫] Studying ASLR^cache
[若渴計畫] Studying ASLR^cacheAj MaChInE
 
[若渴計畫] Black Hat 2017之過去閱讀相關整理
[若渴計畫] Black Hat 2017之過去閱讀相關整理[若渴計畫] Black Hat 2017之過去閱讀相關整理
[若渴計畫] Black Hat 2017之過去閱讀相關整理Aj MaChInE
 
[若渴計畫] Studying Concurrency
[若渴計畫] Studying Concurrency[若渴計畫] Studying Concurrency
[若渴計畫] Studying ConcurrencyAj MaChInE
 
閱讀文章分享@若渴 2016.1.24
閱讀文章分享@若渴 2016.1.24閱讀文章分享@若渴 2016.1.24
閱讀文章分享@若渴 2016.1.24Aj MaChInE
 
[若渴計畫2015.8.18] SMACK
[若渴計畫2015.8.18] SMACK[若渴計畫2015.8.18] SMACK
[若渴計畫2015.8.18] SMACKAj MaChInE
 
[SITCON2015] 自己的異質多核心平台自己幹
[SITCON2015] 自己的異質多核心平台自己幹[SITCON2015] 自己的異質多核心平台自己幹
[SITCON2015] 自己的異質多核心平台自己幹Aj MaChInE
 
[MOSUT20150131] Linux Runs on SoCKit Board with the GPGPU
[MOSUT20150131] Linux Runs on SoCKit Board with the GPGPU[MOSUT20150131] Linux Runs on SoCKit Board with the GPGPU
[MOSUT20150131] Linux Runs on SoCKit Board with the GPGPUAj MaChInE
 
[若渴計畫]由GPU硬體概念到coding CUDA
[若渴計畫]由GPU硬體概念到coding CUDA[若渴計畫]由GPU硬體概念到coding CUDA
[若渴計畫]由GPU硬體概念到coding CUDAAj MaChInE
 
[若渴計畫]64-bit Linux Return-Oriented Programming
[若渴計畫]64-bit Linux Return-Oriented Programming[若渴計畫]64-bit Linux Return-Oriented Programming
[若渴計畫]64-bit Linux Return-Oriented ProgrammingAj MaChInE
 
[MOSUT] Format String Attacks
[MOSUT] Format String Attacks[MOSUT] Format String Attacks
[MOSUT] Format String AttacksAj MaChInE
 

More from Aj MaChInE (17)

An Intro on Data-oriented Attacks
An Intro on Data-oriented AttacksAn Intro on Data-oriented Attacks
An Intro on Data-oriented Attacks
 
A Study on .NET Framework for Red Team - Part I
A Study on .NET Framework for Red Team - Part IA Study on .NET Framework for Red Team - Part I
A Study on .NET Framework for Red Team - Part I
 
[若渴] A preliminary study on attacks against consensus in bitcoin
[若渴] A preliminary study on attacks against consensus in bitcoin[若渴] A preliminary study on attacks against consensus in bitcoin
[若渴] A preliminary study on attacks against consensus in bitcoin
 
[若渴] Preliminary Study on Design and Exploitation of Trustzone
[若渴] Preliminary Study on Design and Exploitation of Trustzone[若渴] Preliminary Study on Design and Exploitation of Trustzone
[若渴] Preliminary Study on Design and Exploitation of Trustzone
 
[若渴]Study on Side Channel Attacks and Countermeasures
[若渴]Study on Side Channel Attacks and Countermeasures [若渴]Study on Side Channel Attacks and Countermeasures
[若渴]Study on Side Channel Attacks and Countermeasures
 
[若渴計畫] Challenges and Solutions of Window Remote Shellcode
[若渴計畫] Challenges and Solutions of Window Remote Shellcode[若渴計畫] Challenges and Solutions of Window Remote Shellcode
[若渴計畫] Challenges and Solutions of Window Remote Shellcode
 
[若渴計畫] Introduction: Formal Verification for Code
[若渴計畫] Introduction: Formal Verification for Code[若渴計畫] Introduction: Formal Verification for Code
[若渴計畫] Introduction: Formal Verification for Code
 
[若渴計畫] Studying ASLR^cache
[若渴計畫] Studying ASLR^cache[若渴計畫] Studying ASLR^cache
[若渴計畫] Studying ASLR^cache
 
[若渴計畫] Black Hat 2017之過去閱讀相關整理
[若渴計畫] Black Hat 2017之過去閱讀相關整理[若渴計畫] Black Hat 2017之過去閱讀相關整理
[若渴計畫] Black Hat 2017之過去閱讀相關整理
 
[若渴計畫] Studying Concurrency
[若渴計畫] Studying Concurrency[若渴計畫] Studying Concurrency
[若渴計畫] Studying Concurrency
 
閱讀文章分享@若渴 2016.1.24
閱讀文章分享@若渴 2016.1.24閱讀文章分享@若渴 2016.1.24
閱讀文章分享@若渴 2016.1.24
 
[若渴計畫2015.8.18] SMACK
[若渴計畫2015.8.18] SMACK[若渴計畫2015.8.18] SMACK
[若渴計畫2015.8.18] SMACK
 
[SITCON2015] 自己的異質多核心平台自己幹
[SITCON2015] 自己的異質多核心平台自己幹[SITCON2015] 自己的異質多核心平台自己幹
[SITCON2015] 自己的異質多核心平台自己幹
 
[MOSUT20150131] Linux Runs on SoCKit Board with the GPGPU
[MOSUT20150131] Linux Runs on SoCKit Board with the GPGPU[MOSUT20150131] Linux Runs on SoCKit Board with the GPGPU
[MOSUT20150131] Linux Runs on SoCKit Board with the GPGPU
 
[若渴計畫]由GPU硬體概念到coding CUDA
[若渴計畫]由GPU硬體概念到coding CUDA[若渴計畫]由GPU硬體概念到coding CUDA
[若渴計畫]由GPU硬體概念到coding CUDA
 
[若渴計畫]64-bit Linux Return-Oriented Programming
[若渴計畫]64-bit Linux Return-Oriented Programming[若渴計畫]64-bit Linux Return-Oriented Programming
[若渴計畫]64-bit Linux Return-Oriented Programming
 
[MOSUT] Format String Attacks
[MOSUT] Format String Attacks[MOSUT] Format String Attacks
[MOSUT] Format String Attacks
 

Recently uploaded

INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxINTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxHumphrey A Beña
 
Transaction Management in Database Management System
Transaction Management in Database Management SystemTransaction Management in Database Management System
Transaction Management in Database Management SystemChristalin Nelson
 
Karra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptxKarra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptxAshokKarra1
 
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSGRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSJoshuaGantuangco2
 
Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designKeynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designMIPLM
 
Global Lehigh Strategic Initiatives (without descriptions)
Global Lehigh Strategic Initiatives (without descriptions)Global Lehigh Strategic Initiatives (without descriptions)
Global Lehigh Strategic Initiatives (without descriptions)cama23
 
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxMULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxAnupkumar Sharma
 
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdfVirtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdfErwinPantujan2
 
Concurrency Control in Database Management system
Concurrency Control in Database Management systemConcurrency Control in Database Management system
Concurrency Control in Database Management systemChristalin Nelson
 
Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Celine George
 
4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptx4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptxmary850239
 
4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptxmary850239
 
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)lakshayb543
 
Barangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptxBarangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptxCarlos105
 
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfInclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfTechSoup
 
ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4MiaBumagat1
 
How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17Celine George
 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPCeline George
 

Recently uploaded (20)

INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxINTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
 
Raw materials used in Herbal Cosmetics.pptx
Raw materials used in Herbal Cosmetics.pptxRaw materials used in Herbal Cosmetics.pptx
Raw materials used in Herbal Cosmetics.pptx
 
Transaction Management in Database Management System
Transaction Management in Database Management SystemTransaction Management in Database Management System
Transaction Management in Database Management System
 
Karra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptxKarra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptx
 
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSGRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
 
Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designKeynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-design
 
Global Lehigh Strategic Initiatives (without descriptions)
Global Lehigh Strategic Initiatives (without descriptions)Global Lehigh Strategic Initiatives (without descriptions)
Global Lehigh Strategic Initiatives (without descriptions)
 
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxMULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
 
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdfVirtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
 
Concurrency Control in Database Management system
Concurrency Control in Database Management systemConcurrency Control in Database Management system
Concurrency Control in Database Management system
 
Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17
 
4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptx4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptx
 
4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx
 
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
 
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptxYOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
 
Barangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptxBarangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptx
 
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfInclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
 
ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4
 
How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17
 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERP
 

[RAT資安小聚] Study on Automatically Evading Malware Detection

  • 1. Study on Automatically Evading Malware Detection @RAT資安小聚 2018.3.25 <ajblane0612@gmail.com> AjMaChInE
  • 2. Who Am I • @若渴 – https://www.slideshare.net/aj0612 • Geek • Freelancer • FB
  • 3. 你有沒有遇過payload generator (e.g. Metaploit’s MsfVenom) 產生的 (reverse) shell 被Antivirus偵測到?
  • 4. Outline Machine Learning (ML) Malware Detection Methods Signature based Behavior based Heuristic based System call CFG … emulator monitorVirtual machine sandbox
  • 5. Signature-Based Detection This technique searches sequences of bytes in order to identify a particular piece of malicious software. A signature is composed of a particular sequence of code or data. This signature is stored on a database which is used to compare to the scanned files. This is the most common method used to detect malware, since it produces a small error rate. [0]
  • 6. Evading Signature-Based Detection Obfuscation-based malware • Encryption – Oligomorphism • Polymorphism • Metamorphism • Compiler-based – Dead-code insertion, Register reassignment, Subroutine reordering, Code transportation, etc.. • … [0][1]
  • 7. Evading Signature-Based Detection - Encryption [2] malware in memory
  • 8. Encryption Methods • Exclusive OR (XOR) • ROT13 • Base64 encoding • AES • Code Packing • … • Oligomorphism – The purpose of this technique is to produce a different decryptor on every new infection. [0][19]
  • 10. 改變實作架構 • Veil framework [8] – Encode/decode – Obfuscation – Non-standard language • python, ruby, Perl, go, etc. • Reflective PE Packer [2][3] • SpookFlare: Stay in Shadows [4] • …
  • 11. Reflective PE Packer • Reflective: Implementing a “minimal” Portable Executable (PE) file “loader” • stub -> loader-> malware – 2014, Arne Swinnen [2] – AMBER [3]
  • 13. 2014, Arne Swinnen [2] .code JIT compiler ?
  • 15. AMBER [3] Multi stage payload attack model
  • 16. Stub (and Malware) Stealthy - Inline Packer [2]
  • 18. Stub Stealthy – Resource Packer [2]
  • 19. [2]
  • 20. SpookFlare [4] • Code Document Object Model (CodeDOM)
  • 21. Evading Signature-Based Detection - Polymorphism Return-Oriented Programming as a polymorphism alternative [5]
  • 22. Evading Signature-Based Detection - Metamorphsm • VM-based malware
  • 23. Signature-Based AV is Dead Machine Learning (ML) Malware Detection Methods Signature based Behavior based Heuristic based System call CFG … emulator monitorVirtual machine sandbox
  • 24. Behavior-Based Detection A behavior-based detector basically consists of the following components • Data Collector – This component collects dynamic / static information about the execution • Interpreter – This component converts raw information collected by data collection module into intermediate representations • Matcher – It is used to compare this representation with the behavior signatures [7]
  • 25. The Main Advantage of the Behavior-Based Detection “is the ability to detect the type of malwares that signature base techniques are unable to detect such as unknown and polymorphic (behavior) malware variants. On the other hand, non-availability of promising False Positive Ratio (FPR) and also high amount of scanning (database) time are the main disadvantages of these behavior based malware detection methods” [7]
  • 26. Improving Detection Performance Machine Learning (ML) Malware Detection Methods Signature based Behavior based Heuristic based System call CFG … emulator monitorVirtual machine sandbox
  • 27. Using Behavior-based or Heuristic-based Detection After running malware ? NO
  • 28. Running the Malware inside with Isolation and Monitor (Golden Image) Machine Learning (ML) Malware Detection Methods Signature based Behavior based Heuristic based System call CFG … emulator monitorVirtual machine sandbox
  • 29. The AV Detection Flow with Isolation and Monitor “The principle is executing the malware inside a controlled environment in order to trigger the unpacking of the executable in memory, detect the end of the unpacking process by either using automated unpacker or by monitoring the execution of writable memory sections. Once the unpacking process is detected, the collected data is re-run using Static-based analysis or fed to the heuristic engine. “ – Cuckoo sandbox (open source) – … [2]
  • 30. Inline API Hooks for Sandbox sandbox sandbox [9]
  • 31. Notes of The AV with Isolation and Monitor • Where to trigger the malware • Sandbox monitors software behavior in an isolation environment implemented by using emulator-based or hardware virtualization- based methods (Isolation)
  • 32. Evading an Isolation Environment • AV detector (Detect sandbox-inherent characteristics) • Detect virtualization [11]
  • 33. Evading an Isolation Environment- AV Detector main(){ … If ( AV is detected) { call main(); } else { decrpt(); run_malware(); }
  • 34. One of Concepts of Implementing AV Detector Fingerprinting sandboxes [12]
  • 35. Categories of Fingerprinting Sandboxes • Timing – sandboxes only run the file a limited time • File – e.g. The number of installed programs are examined by a test case utilizing the Windows registry, as well as the number of recently modified files - which are expected to be none at a sandbox • Process – e.g. running processes will be less compared to regular clients (clean installations of Windows) • CPU instruction – e.g. Incorrectly emulated instructions [9]
  • 36. Categories of Fingerprinting Sandboxes • Environment – e.g. users are expected to have password protected their accounts while sandboxes most likely have not • Hardware – e.g. resources are expected to be higher on a user client than on a sandbox running inside a virtual machine. • Network – e.g. the attacker reads the data returned and checks the first four bytes of the return to find "<!do". This string is likely the "<!doctype html>" tag that is found at the start of the Google website (and others). I checked a few sandbox programs that try to mimic the Internet and most of them just serve up an HTML page without the "<!doctype html>" tag. • … [9][13]
  • 38. “Since the sandboxes were treated as black boxes during the tests, no research could be done” [9] 可發揮的地方e.g. [14] AjMaChInE: 或許可以建立heuristic method
  • 39. P: AV Detector非常強悍 S: “Facing the problem of evasion, researchers proposed new techniques to analyze the hidden behavior of evasive malware. A generic approach to counter evasive behavior is exploring multiple execution paths” [11] e.g. turn a greater-than operation to a less-or-equal => 修改conditional branches
  • 40. 但是[11] Overcoming these approaches by converting conditional branches to indirect jumps/calls
  • 41. 使用 Symbolic Execution Multiple Execution Paths會比較好嗎 ?
  • 42. The Disadvantage of Symbolic Execution [15] • Limitation of symbolic execution in unrolling loops – Typically, only a fixed number of times or a fixed amount of time is spent to approximate the analysis • Unsolved conjectures – are unproven propositions or theorems that appear to be correct and have not been disproven – e.g. 3x + 1 conjecture, 5x+1 conjecture, 7x+1 conjecture, Matthews conjecture, Juggler sequence, etc..
  • 43. Obfuscated Code of 3x + 1 Conjecture [15]
  • 44. Evading an Isolation Environment- Detect Virtualization [11]
  • 45. Evading an Isolation Environment- Detect Virtualization [11]
  • 46. Evading an Isolation Environment- Detect Virtualization [11]
  • 47. Evading an Isolation Environment- Detect Virtualization [11]
  • 50. Malware Specification for System- Call-Behavior [16] Malware specification graph of download- execution: recv ∧ open → write → exec
  • 52. Architecture of Shadow Attacks [16] Shadow Process Coordination/Communication (SPC) • Side channel • Covert cache • Branch predictor • Inter-Process Communication (IPC)
  • 54. Hiding Local SPC through Remote Network Coordination
  • 55. Mixed, Indirect, Implicit SPC Chain SPC就是用很複雜就對了。
  • 57. Replacement Attack Arsenal • Inserting redundant dependencies • Sub-System Call Data Graph mutations
  • 58. Replacement Attack Arsenal - Inserting Redundant Dependencies • “NtSetInformationFile” can replace the dependencies with FileHandle as medium, which has been illustrated in above Fig. • “NtDuplicateObject” returns a duplicated object handle, which refers to the same object as the original handle. • The medium of “void *address”, we can insert “NtQueryVirtualMemory” or “NtReadVirtualMemory”, which do not affect the mapped memory address.
  • 59. Replacement Attack Arsenal - Inserting Redundant Dependencies • “NtQuery*” attack. There are several windows native APIs for querying information of kernel objects, such as “NtQueryAttributesFile”, “NtQueryKey”, “NtQueryInformationProcess” and “NtQueryInformationFile”. All of these query APIs take certain object handle as one of input argument and output object information. No any modification is introduced to the kernel objects. Hence “NtQuery*” native APIs are good candidates for our replacement attacks. – For example, • NtCreateFile → NtSetInformationFile • NtCreateFile → NtQueryInformationFile” (“FileInformation”) -> NtSetInformationFile
  • 60. Replacement Attack Arsenal - Sub- SCDG mutations • Replication (複製行為). For example, we can copy a file by calling “NtReadFile” and “NtWriteFile” instead of using memory as medium • Modify registry for persistence [18] • Code remote injection • 就是改程式碼以及架構。
  • 61. The Example of Sub-SCDG Mutations Sub-SCDG mutations
  • 62. I Love the Ideal about API Replacer
  • 63. Bot vs. Bot–Malware Detection [21]
  • 64. Bot vs. Bot–Malware Detection [21]
  • 65. Bot vs. Bot–Malware Evading [21] 如果沒有分數 資訊?
  • 66. Evading Bot Malware Detection via Reinforcement Learning [21]
  • 67. 目前Bot vs. Bot 看到就只是處理 signature對決,還沒看到behavior evading處理。
  • 68. Cat-and-Mouse Game • AjMaChInE: unknown techniques (無限可能) > know,所以我不相信AV可利用AI來解決。 – Signature-based is dead – AV detector非常強悍 – Evade system-call-based behavior analysis • 社群朋友: 防守AI加入直覺
  • 69. Reference • [0] 2017, Jhonattan J. Barriga A, etc. “Malware Detection and Evasion with Machine Learning Techniques: A Survey” • [1] 2018, Andrea Fortuna, “Malware hiding and evasion techniques” • [2] 2014, Arne Swinnen, etc. “One packer to rule them all: Empirical identification, comparison and circumvention of current Antivirus detection techniques”, • [3] 2017, “AMBER: Reflective PE Packer”, https://github.com/EgeBalci/Amber • *4+ 2017, “SpookFlare: Stay in Shadows”, https://artofpwn.com/spookflare.html • [5] 2015, “Advanced Antivirus Evasion Techniques”, https://github.com/gpoulios/ROPInjector • [6] 2018, Tim Blazytko, etc. “Breaking State-of-the-Art Binary Code Obfuscation A Program Synthesis-based Approach”
  • 70. Reference • [7] 2013, Zahra Bazrafshan, etc. “A Survey on Heuristic Malware Detection Techniques” • [8] 2016, Ctruncer, ”The Art of AV Evasion - or Lack Thereof ” • [9] 2016, Gustav Lundsgard, etc. “Bypassing modern sandobx technologies: An experiment on sandbox evasion techniques” • [10] 2016, Jeremy Blackthorne, etc. “AVLeak: Fingerprinting Antivirus Emulators Through Black-Box Testing” • [11] 2016, Michael Brengel, etc. “Detecting Hardware-Assisted Virtualization” • [12] 2016, Michael Brengel etc. , “Evading Malware Sandboxes” • [13] 2017, MalwareJake, “Novel malware sandbox evasion” • [14] 2017. “Spotless Sandboxes: Evading Malware Analysis Systems using Wear-and-Tear Artifacts”
  • 71. Reference • [15] 2011, Zhi Wang, etc. “Linear Obfuscation to Combat Symbolic Execution” • [16] 2012, Weiqin Ma, etc. “Shadow Attacks: Automatically Evading System-Call-Behavior Based Malware Detection” • [17] 2015, Jiang Ming, etc. “Replacement Attacks: Automatically Impeding Behavior-based Malware Specifications” • [18] 2013, Scott Langendorf “Windows registry persistence, part 2: The run keys and search-order” • *19+ 2016, Andrea Fortuna, etc. “Malware obfuscation techniques: four simple examples” • [20] 2017, Kristian Iliev, etc. “Top 6 Advanced Obfuscation Techniques Hiding Malware on Your Device” • [21] 2017, Hyrum S. Anderson, etc. “Evading Machine Learning Malware Detection”