Analysis and Categorization of Drive-by Download Malware

Mohit Singhal, David Levine
{"title":"Analysis and Categorization of Drive-by Download Malware","authors":"Mohit Singhal, David Levine","doi":"10.1109/CCCS.2019.8888147","DOIUrl":null,"url":null,"abstract":"With the increase in the usage of websites as the main source of information gathering, malicious activity especially drive-by download has exponentially increased. A drive-by download refers to unintentional download of malicious code to a user computer that leaves the user open to a cyberattack. It has become the preferred distribution vector for many malware families. The purpose of this research is to analyze the malware that were obtained from visiting approximately 100,000 malicious URLs and running these binaries in sandboxes and then analyzing their runtime behavior with a software tool (YARA) to categorize them and classify the malware family to which they belong. Out of the 1414 executables (binaries), 1000 binaries were executed and 99 were identified as false-positive. Out of the 901 binaries, 867 of them were identified as Trojan Horse and we were able to identify 53 type of malware families, with one particular family, Kyrptik, being the largest. It is concluded that about 12% of the binaries were having office macros that were establishing C2 servers once they were executed in Microsoft Word/Excel. Also, a total of 105 binaries which had the same name and were extracted from the same website but had different hashes and the mean difference between the first store and the last store was 17 days and about 5% of these binaries were showing different results from the first store of the binary to the last store of the binary were also identified.","PeriodicalId":152148,"journal":{"name":"2019 4th International Conference on Computing, Communications and Security (ICCCS)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2019-05-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"5","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2019 4th International Conference on Computing, Communications and Security (ICCCS)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CCCS.2019.8888147","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 5

Abstract

With the increase in the usage of websites as the main source of information gathering, malicious activity especially drive-by download has exponentially increased. A drive-by download refers to unintentional download of malicious code to a user computer that leaves the user open to a cyberattack. It has become the preferred distribution vector for many malware families. The purpose of this research is to analyze the malware that were obtained from visiting approximately 100,000 malicious URLs and running these binaries in sandboxes and then analyzing their runtime behavior with a software tool (YARA) to categorize them and classify the malware family to which they belong. Out of the 1414 executables (binaries), 1000 binaries were executed and 99 were identified as false-positive. Out of the 901 binaries, 867 of them were identified as Trojan Horse and we were able to identify 53 type of malware families, with one particular family, Kyrptik, being the largest. It is concluded that about 12% of the binaries were having office macros that were establishing C2 servers once they were executed in Microsoft Word/Excel. Also, a total of 105 binaries which had the same name and were extracted from the same website but had different hashes and the mean difference between the first store and the last store was 17 days and about 5% of these binaries were showing different results from the first store of the binary to the last store of the binary were also identified.
驱动下载恶意软件的分析与分类
随着人们越来越多地使用网站作为信息收集的主要来源,恶意活动特别是飞车下载呈指数级增长。“drive-by download”指的是无意中将恶意代码下载到用户电脑上,从而使用户容易受到网络攻击。它已经成为许多恶意软件家族的首选传播媒介。本研究的目的是分析通过访问大约100,000个恶意url并在沙箱中运行这些二进制文件获得的恶意软件,然后使用软件工具(YARA)分析其运行时行为,对它们进行分类并对它们所属的恶意软件家族进行分类。在1414个可执行文件(二进制文件)中,执行了1000个二进制文件,其中99个被识别为假阳性。在901个二进制文件中,867个被确定为特洛伊木马,我们能够识别53种类型的恶意软件家族,其中一个特定的家族,Kyrptik,是最大的。得出的结论是,大约12%的二进制文件中有office宏,这些宏一旦在Microsoft Word/Excel中执行,就会建立C2服务器。此外,共有105个具有相同名称的二进制文件从同一网站提取,但具有不同的哈希值,第一个存储和最后一个存储之间的平均差异为17天,其中约5%的二进制文件从二进制的第一个存储到最后一个存储显示不同的结果。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信