Skip to main content

2024 | OriginalPaper | Buchkapitel

Following the Obfuscation Trail: Identifying and Exploiting Obfuscation Signatures in Malicious Code

verfasst von : Julien Cassagne, Ettore Merlo, Guy-Vincent Jourdan, Iosif-Viorel Onut

Erschienen in: Foundations and Practice of Security

Verlag: Springer Nature Switzerland

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

In this paper, we delve into the intricate world of dynamic code generation in script languages. One way that malicious code authors can evade detection through static analysis is using obfuscation and relying on dynamic code generation to deobfuscate the code at runtime. These obfuscation techniques can be highly intricate, involving numerous recursive “eval” calls to ultimately reveal the payload, or requiring the deobfuscation of separately generated code segments. This complexity presents significant challenges for researchers studying such code and for tools attempting static analysis. However, the very effort invested by attackers in obfuscation and the structures they create and reuse across attacks can also serve as a distinctive signature of the attacker. In this paper, we propose leveraging the structure of these obfuscation mechanisms as a similarity metric for malicious software.
Our proposed method focuses on extracting obfuscation strategies, which we evaluate using two extensive datasets comprising over 30,000 phishing kits. Within these datasets, we identified approximately 18,000 instances of dynamically generated code, resulting in only 569 unique signatures. One notable advantage of our method compared to the state-of-the-art approaches is that it can extract a partial signature even if the deobfuscation process remains incomplete. Other methods heavily rely on the payload, rendering them inconclusive when the payload cannot be extracted.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Fußnoten
1
We are publicly releasing [4] the PHP code and signatures coming from public dataset, the signatures from private dataset, while the PHP code from the private dataset will be made available to researchers from academia upon request and after verification.
 
Literatur
1.
Zurück zum Zitat Aho, A.V., Lam, M.S., Sethi, R., Ullman, J.D.: Compilers: Principles, Techniques, and Tools, 2nd edn. Addison-Wesley Longman Publishing Co. Inc. (2006) Aho, A.V., Lam, M.S., Sethi, R., Ullman, J.D.: Compilers: Principles, Techniques, and Tools, 2nd edn. Addison-Wesley Longman Publishing Co. Inc. (2006)
3.
Zurück zum Zitat Blanc, G., Miyamoto, D., Akiyama, M., Kadobayashi, Y.: Characterizing obfuscated javascript using abstract syntax trees: experimenting with malicious scripts. In: 2012 26th International Conference on Advanced Information Networking and Applications Workshops, pp. 344–351 (2012). https://doi.org/10.1109/WAINA.2012.140 Blanc, G., Miyamoto, D., Akiyama, M., Kadobayashi, Y.: Characterizing obfuscated javascript using abstract syntax trees: experimenting with malicious scripts. In: 2012 26th International Conference on Advanced Information Networking and Applications Workshops, pp. 344–351 (2012). https://​doi.​org/​10.​1109/​WAINA.​2012.​140
9.
Zurück zum Zitat Hajarnis, K., Dalal, J., Bawale, R., Abraham, J., Matange, A.: A comprehensive solution for obfuscation detection and removal based on comparative analysis of deobfuscation tools. In: 2021 International Conference on Smart Generation Computing, Communication and Networking (SMART GENCON), pp. 1–7 (2021). https://doi.org/10.1109/SMARTGENCON51891.2021.9645824 Hajarnis, K., Dalal, J., Bawale, R., Abraham, J., Matange, A.: A comprehensive solution for obfuscation detection and removal based on comparative analysis of deobfuscation tools. In: 2021 International Conference on Smart Generation Computing, Communication and Networking (SMART GENCON), pp. 1–7 (2021). https://​doi.​org/​10.​1109/​SMARTGENCON51891​.​2021.​9645824
11.
Zurück zum Zitat Jensen, S.H., Jonsson, P.A., Møller, A.: Remedying the eval that men do. In: Proceedings of the 2012 International Symposium on Software Testing and Analysis (ISSTA 2012), pp. 34–44. Association for Computing Machinery, New York (2012). https://doi.org/10.1145/2338965.2336758 Jensen, S.H., Jonsson, P.A., Møller, A.: Remedying the eval that men do. In: Proceedings of the 2012 International Symposium on Software Testing and Analysis (ISSTA 2012), pp. 34–44. Association for Computing Machinery, New York (2012). https://​doi.​org/​10.​1145/​2338965.​2336758
12.
13.
Zurück zum Zitat Li, Z., Chen, Q.A., Xiong, C., Chen, Y., Zhu, T., Yang, H.: Effective and light-weight deobfuscation and semantic-aware attack detection for powershell scripts. In: Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security (CCS 2019), pp. 1831–1847. Association for Computing Machinery, New York (2019). https://doi.org/10.1145/3319535.3363187 Li, Z., Chen, Q.A., Xiong, C., Chen, Y., Zhu, T., Yang, H.: Effective and light-weight deobfuscation and semantic-aware attack detection for powershell scripts. In: Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security (CCS 2019), pp. 1831–1847. Association for Computing Machinery, New York (2019). https://​doi.​org/​10.​1145/​3319535.​3363187
16.
17.
Zurück zum Zitat Oest, A., Safei, Y., Doupe, A., Ahn, G.J., Wardman, B., Warner, G.: Inside a phisher’s mind: understanding the anti-phishing ecosystem through phishing kit analysis. In: Proceedings of the 2018 APWG Symposium on Electronic Crime Research, eCrime 2018, pp. 1–12. eCrime Researchers Summit, eCrime, IEEE Computer Society (2018). https://doi.org/10.1109/ECRIME.2018.8376206 Oest, A., Safei, Y., Doupe, A., Ahn, G.J., Wardman, B., Warner, G.: Inside a phisher’s mind: understanding the anti-phishing ecosystem through phishing kit analysis. In: Proceedings of the 2018 APWG Symposium on Electronic Crime Research, eCrime 2018, pp. 1–12. eCrime Researchers Summit, eCrime, IEEE Computer Society (2018). https://​doi.​org/​10.​1109/​ECRIME.​2018.​8376206
21.
Zurück zum Zitat Thiemann, P.: Grammar-based analysis of string expressions. In: Proceedings of the 2005 ACM SIGPLAN International Workshop on Types in Languages Design and Implementation (TLDI 2005), pp. 59–70. Association for Computing Machinery, New York (2005). https://doi.org/10.1145/1040294.1040300 Thiemann, P.: Grammar-based analysis of string expressions. In: Proceedings of the 2005 ACM SIGPLAN International Workshop on Types in Languages Design and Implementation (TLDI 2005), pp. 59–70. Association for Computing Machinery, New York (2005). https://​doi.​org/​10.​1145/​1040294.​1040300
Metadaten
Titel
Following the Obfuscation Trail: Identifying and Exploiting Obfuscation Signatures in Malicious Code
verfasst von
Julien Cassagne
Ettore Merlo
Guy-Vincent Jourdan
Iosif-Viorel Onut
Copyright-Jahr
2024
DOI
https://doi.org/10.1007/978-3-031-57537-2_20

Premium Partner