RMIT University
Browse

Reanimating Historic Malware Samples

chapter
posted on 2024-11-01, 01:54 authored by Paul Black, Iqbal GondalIqbal Gondal, Peter Vamplew, Arun Lakhotia
Many types of malicious software are controlled from an attacker’s command and control (C2) servers. Anti-virus organizations seek to defeat malware attacks by requesting removal of C2 server Domain Name Server (DNS) records. As a result, the life span of most malware samples is relatively short. Large datasets of historical malware samples are available for countermeasures research. However, due to the age of these malware samples, their C2 servers are no longer available. To cope with high volumes of malware production, malware analysis is increasingly performed using machine learning techniques. Dynamic analysis is commonly used for feature extraction. However, due to the absence of their C2 servers, after initialization, malware samples may exit or loop attempting to establish C2 server connections and, as a result, no longer exhibit their original capabilities. Therefore, partial execution of historical malware samples in a sandbox results in features that differ from those that would be extracted in-the-wild, thus invalidating the results of any machine learning research based on these features. One approach to extracting accurate features is to build an emulated C2 server to provide an environment that allows control of the full capabilities of the malware in an isolated environment. To illustrate the benefits of building C2 server emulators, this chapter provides examples of techniques for the creation of C2 server emulators for three malware families (Zeus, CryptoWall, and CryptoLocker) using manual reverse engineering techniques and a review of semi-automated techniques for the construction of C2 server emulators.

History

Related Materials

  1. 1.
    DOI - Is published in 10.1007/978-3-030-62582-5_13
  2. 2.
    ISBN - Is published in 9783030625818 (urn:isbn:9783030625818)

Start page

345

End page

360

Total pages

16

Outlet

Malware Analysis Using Artificial Intelligence and Deep Learning

Editors

Mark Stamp, Mamoun Alazab, and Andrii Shalaginov

Publisher

Springer Nature

Place published

Cham, Switzerland

Language

English

Copyright

© The Author(s), under exclusive license to Springer Nature Switzerland AG 2021

Former Identifier

2006109977

Esploro creation date

2021-10-13

Usage metrics

    Scholarly Works

    Exports

    RefWorks
    BibTeX
    Ref. manager
    Endnote
    DataCite
    NLM
    DC