一种从恶意文档文件中提取RAT的暴力强制工具的评估

M. Mimura, Yuhei Otsubo, Hidehiko Tanaka
{"title":"一种从恶意文档文件中提取RAT的暴力强制工具的评估","authors":"M. Mimura, Yuhei Otsubo, Hidehiko Tanaka","doi":"10.1109/AsiaJCIS.2016.17","DOIUrl":null,"url":null,"abstract":"APT(Advanced Persistent Threat) attacks that cause unauthorized transfer of sensitive information from the targeted organization are serious threats. The attackers in APT attacks use RAT(Remote Access Trojan or Remote Administration Tool)s to take the control of the victim's computer. The attackers in APT attacks occasionally use malicious document files to camouflage themselves. If a RAT is embedded into a malicious document file, it is more difficult to detect and analyze the function. Analyzing malicious document files attached to spear phishing e-mails requires extracting the RAT. However, if we do not know the condition where the exploit code runs normally, it is difficult to extract the RAT by dynamic analysis. Therefore, we developed a brute forcing tool which decodes obfuscation and extracts the RAT from a malicious document file. This tool was developed based on the malicious document files which were used between 2009 and 2012 in APT attacks, and indicated how to embed a RAT in a malicious document file. However, whether our method can extract or detect recent RATs in APT attacks or not is uncertain. In this paper, we investigate recent malicious document files which were used between 2013 and 2015 in APT attacks, and reveal the recent trend of the encoding methods with this tool. Moreover, we compare the success rates with the other detection methods such as antivirus programs with the latest virus definitions. Even if a malicious document file which contains executable files does not perform malicious activities in dynamic analysis, this tool extracts the executable files automatically without executing the malicious document file. In addition, this tool hardly give false positives. We can use this tool to detect unknown malicious document files in dynamic analysis or at mail gateways.","PeriodicalId":213242,"journal":{"name":"2016 11th Asia Joint Conference on Information Security (AsiaJCIS)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2016-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"15","resultStr":"{\"title\":\"Evaluation of a Brute Forcing Tool that Extracts the RAT from a Malicious Document File\",\"authors\":\"M. Mimura, Yuhei Otsubo, Hidehiko Tanaka\",\"doi\":\"10.1109/AsiaJCIS.2016.17\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"APT(Advanced Persistent Threat) attacks that cause unauthorized transfer of sensitive information from the targeted organization are serious threats. The attackers in APT attacks use RAT(Remote Access Trojan or Remote Administration Tool)s to take the control of the victim's computer. The attackers in APT attacks occasionally use malicious document files to camouflage themselves. If a RAT is embedded into a malicious document file, it is more difficult to detect and analyze the function. Analyzing malicious document files attached to spear phishing e-mails requires extracting the RAT. However, if we do not know the condition where the exploit code runs normally, it is difficult to extract the RAT by dynamic analysis. Therefore, we developed a brute forcing tool which decodes obfuscation and extracts the RAT from a malicious document file. This tool was developed based on the malicious document files which were used between 2009 and 2012 in APT attacks, and indicated how to embed a RAT in a malicious document file. However, whether our method can extract or detect recent RATs in APT attacks or not is uncertain. In this paper, we investigate recent malicious document files which were used between 2013 and 2015 in APT attacks, and reveal the recent trend of the encoding methods with this tool. Moreover, we compare the success rates with the other detection methods such as antivirus programs with the latest virus definitions. Even if a malicious document file which contains executable files does not perform malicious activities in dynamic analysis, this tool extracts the executable files automatically without executing the malicious document file. In addition, this tool hardly give false positives. We can use this tool to detect unknown malicious document files in dynamic analysis or at mail gateways.\",\"PeriodicalId\":213242,\"journal\":{\"name\":\"2016 11th Asia Joint Conference on Information Security (AsiaJCIS)\",\"volume\":\"24 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2016-08-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"15\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2016 11th Asia Joint Conference on Information Security (AsiaJCIS)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/AsiaJCIS.2016.17\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2016 11th Asia Joint Conference on Information Security (AsiaJCIS)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/AsiaJCIS.2016.17","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 15

摘要

APT(Advanced Persistent Threat,高级持续威胁)攻击是一种严重的威胁,它会导致未经授权的敏感信息从目标组织中转移出去。在APT攻击中,攻击者利用RAT(Remote Access Trojan或Remote Administration Tool)来控制受害者的计算机。APT攻击中的攻击者偶尔会使用恶意文档文件来伪装自己。如果将RAT嵌入到恶意文档文件中,则更难检测和分析该功能。分析鱼叉式网络钓鱼邮件附带的恶意文档文件需要提取RAT。然而,如果我们不知道攻击代码正常运行的条件,则很难通过动态分析来提取RAT。因此,我们开发了一种暴力破解工具,可以解码混淆并从恶意文档文件中提取RAT。该工具是基于2009年至2012年APT攻击中使用的恶意文档文件开发的,并说明了如何在恶意文档文件中嵌入RAT。然而,我们的方法是否可以提取或检测APT攻击中最近的rat是不确定的。本文研究了2013年至2015年APT攻击中使用的恶意文档文件,揭示了该工具编码方法的最新趋势。此外,我们比较了成功率与其他检测方法,如杀毒程序与最新的病毒定义。即使包含可执行文件的恶意文档文件在动态分析中没有进行恶意活动,该工具也会自动提取可执行文件,而不执行恶意文档文件。此外,该工具几乎不会产生误报。我们可以使用此工具在动态分析或邮件网关中检测未知的恶意文档文件。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
Evaluation of a Brute Forcing Tool that Extracts the RAT from a Malicious Document File
APT(Advanced Persistent Threat) attacks that cause unauthorized transfer of sensitive information from the targeted organization are serious threats. The attackers in APT attacks use RAT(Remote Access Trojan or Remote Administration Tool)s to take the control of the victim's computer. The attackers in APT attacks occasionally use malicious document files to camouflage themselves. If a RAT is embedded into a malicious document file, it is more difficult to detect and analyze the function. Analyzing malicious document files attached to spear phishing e-mails requires extracting the RAT. However, if we do not know the condition where the exploit code runs normally, it is difficult to extract the RAT by dynamic analysis. Therefore, we developed a brute forcing tool which decodes obfuscation and extracts the RAT from a malicious document file. This tool was developed based on the malicious document files which were used between 2009 and 2012 in APT attacks, and indicated how to embed a RAT in a malicious document file. However, whether our method can extract or detect recent RATs in APT attacks or not is uncertain. In this paper, we investigate recent malicious document files which were used between 2013 and 2015 in APT attacks, and reveal the recent trend of the encoding methods with this tool. Moreover, we compare the success rates with the other detection methods such as antivirus programs with the latest virus definitions. Even if a malicious document file which contains executable files does not perform malicious activities in dynamic analysis, this tool extracts the executable files automatically without executing the malicious document file. In addition, this tool hardly give false positives. We can use this tool to detect unknown malicious document files in dynamic analysis or at mail gateways.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信