Malware Classification And Detection

advertisement
Matt Banick

Broad Definition: “Let us take the easy one
first. "Malware" is short for malicious software
and is typically used as a catch-all term to
refer to any software designed to cause
damage to a single computer, server, or
computer network, whether it's a virus,
spyware, et al.” (1)

How to Classify Malware?
◦ Trojan, Virus, Worm, Spyware, etc
◦ Level of compromise?

Security Classification?
◦ Degree of OS compromise
◦ Changes
◦ Security Compromise

“Stealth” Malware Taxonomy
◦ Joanna Rutkowska

Malware re-definition
◦ Changes in OS Kernel
◦ Security applications
◦ Other processes


Four types (0-3)
No true order



OS, security processes, other processes
unaffected
“Legal” use of APIs
Still a threat!


Malware changes ‘constant’ data
True ‘system compromise’


Malware changes ‘dynamic’ parts of system
Similar to Type 1


Similar to Type 0.. In a way
Hypervisor control



Signature-based
Heuristic-based
Others?


Code-based ‘dictionary’ search
Targets static parts of Malware
For (Sig a : dictionary)..

Polymorphic Viruses
◦ Encryption + crafty = disaster

Code Obfuscation
◦ War which may never end

Metamorphic Viruses
◦ Polymorphic-Polymorphic virus!
eval('document.'+potato+'.s
tyle.color= "red"');

Can include different concepts
◦
◦
◦
◦

Virus activity
Instruction oddities
File activity
Network activity
Static
◦ Code review

Dynamic
◦ Watch and wait…

False-positives can be costly
◦ User indifference
◦ PR nightmare
◦ Slow
While (a < 5000)
sleep(5);
//random code
Some_malicious_code
//random code
Some_more_malicious_code
//random code
… etc.




What “Should” occur?
Emerging research
Math based (in a way…)
Problems
◦ Dynamic web pages
◦ Analysis is costly
◦ White-listing processes









http://technet.microsoft.com/en-us/library/dd632948.aspx (1)
Sony Rootkit: http://blogs.technet.com/b/markrussinovich/archive/2005/10/31/sony-rootkits-and-digital-rightsmanagement-gone-too-far.aspx
Polymorphic Viruses: http://www.symantec.com/avcenter/reference/striker.pdf
Obfuscation: http://delivery.acm.org/10.1145/1780000/1772720/p281cova.pdf?key1=1772720&key2=0800233031&coll=DL&dl=ACM&ip=129.244.189.101&CFID=17197576&CFTOKEN=8574
6334
Metamorphic Viruses: http://www.symantec.com/avcenter/reference/hunting.for.metamorphic.pdf
RDAE & Other info: http://docs.google.com/viewer?a=v&q=cache:p2XzCVP51GQJ:www.waset.org/journals/waset/v34/v3445.pdf+RDA+decryption+engines&hl=en&gl=us&pid=bl&srcid=ADGEESj7KEkEBTkeJ5ydlcAafATSGutwPlsjA8mzG6d_bsnAk
UbeOoZSnfe6BIGNC4ffQZpacWFGzeKWhsH8JMn7LkYdfCwOd2q-VkDnyvrunTVfM4CSQOO1xui6uB3DUgEBc3mX_n3&sig=AHIEtbQu67h41KBkC3HjISYFceSrQFQZUQ
Samsung Issue: http://www.thetechherald.com/article.php/201113/6997/Samsung-keylogger-fears-based-on-falsepositives
Heuristic Basics: http://vx.netlux.org/lib/static/vdat/epheurs1.htm
More Heuristics (Dynamic):
http://service1.symantec.com/legal/publishedpatents.nsf/0/4b4a30633137923b88256df7005d6b5d/$FILE/United%20Stat
es%20Patent%206,357,008.htm

User-based detection: http://otc.rutgers.edu/pdf/Yao-09-046.pdf

User-based detection cont: http://people.cs.vt.edu/danfeng/papers/paper106_icics2009.pdf

Blue Pill wrap: http://securitywatch.eweek.com/showdown_at_the_blue_pill_corral.html





http://www.google.com/imgres?imgurl=http://withfriendship.com/images/b/8701/trojan-horsevirus.png&imgrefurl=http://withfriendship.com/user/pintu/trojan-horsevirus.php&usg=__pBZIK81boUOnTGwvq22ggTo4dpk=&h=413&w=551&sz=28&hl=en&start=8&sig2=Itoi02OTbd0L3AcSiaHDDQ&zoom=1&tbnid=cUkl2JE
K07AXKM:&tbnh=100&tbnw=133&ei=lUGrTdCQHuXm0QG3itz5CA&prev=/images%3Fq%3DTrojan%2Bhorse%26um%3D1%26hl%3Den%26client%3Dfirefoxa%26sa%3DN%26rls%3Dorg.mozilla:en-US:official%26biw%3D1600%26bih%3D707%26tbm%3Disch&um=1&itbs=1
http://www.google.com/imgres?imgurl=http://www.topnews.in/files/sony_logo_1.jpg&imgrefurl=http://www.topnews.in/technologyupdate/sony&usg=__IWFxwkG68KOnUXwbhfLw8wyCv4=&h=400&w=600&sz=12&hl=en&start=0&sig2=5dGNYCEjtqlyqXvQe8aSgQ&zoom=1&tbnid=pkP8vBhPZ6WRM:&tbnh=143&tbnw=214&ei=TEmrTYH8IMba0QG21eWdCQ&prev=/images%3Fq%3DSony%26um%3D1%26hl%3Den%26client%3Dfirefoxa%26rls%3Dorg.mozilla:enUS:official%26biw%3D1600%26bih%3D707%26tbm%3Disch&um=1&itbs=1&iact=hc&vpx=138&vpy=150&dur=58897&hovh=183&hovw=275&tx=201&ty=
93&oei=TEmrTYH8IMba0QG21eWdCQ&page=1&ndsp=21&ved=1t:429,r:0,s:0
http://www.google.com/imgres?imgurl=http://images.amazon.com/images/G/01/software/detail-page/kasperskyvirus.jpg&imgrefurl=http://www.amazon.com/Kaspersky-Anti-Virus-7-0-OLDVERSION/dp/B000U819A2&usg=__oJrp_dVVIHZ2A2T6c6r7f8Bos9s=&h=385&w=300&sz=27&hl=en&start=0&sig2=MpYwwna9pcxc2Nqb9cHGhw&zoom=
1&tbnid=mj4A1xEQlKMeWM:&tbnh=133&tbnw=104&ei=SRCvTaC6GoXa0QGl9ryoCw&prev=/images%3Fq%3Dvirus%2Bdetection%26hl%3Den%26biw%3D16
00%26bih%3D707%26gbv%3D2%26tbm%3Disch&itbs=1&iact=hc&vpx=131&vpy=70&dur=307&hovh=209&hovw=163&tx=108&ty=124&oei=SRCvTaC6Go
Xa0QGl9ryoCw&page=1&ndsp=33&ved=1t:429,r:0,s:0
http://www.google.com/imgres?imgurl=http://vxheavens.com/lib/img/mjp00/biennale.py_code72.jpg&imgrefurl=http://vxheavens.com/lib/mjp00.html&usg=__d9ctjQol4n95KZa9g1iS3sfaYKI=&h=329&w=346&sz=175&hl=en&start=21&sig2=U9qp
VQz1A0wTEWpMR8ReBw&zoom=1&tbnid=Ba1UnpCi56snOM:&tbnh=127&tbnw=125&ei=TBmvTYqjIozegQfs9I3xCw&prev=/search%3Fq%3Dcode%26hl%3D
en%26client%3Dfirefox-a%26rls%3Dorg.mozilla:enUS:official%26biw%3D1600%26bih%3D707%26site%3Dsearch%26tbm%3Disch0%2C760&um=1&itbs=1&iact=hc&vpx=223&vpy=327&dur=244&hovh=219&
hovw=230&tx=70&ty=139&oei=KBmvTcmrEO-L0QGUk9GjCw&page=2&ndsp=38&ved=1t:429,r:29,s:21&biw=1600&bih=707
http://www.thetechherald.com/article.php/201113/6997/Samsung-keylogger-fears-based-on-false-positives
Download