Malware sandboxes are automated dynamic analysis systems that execute programs in a controlled environment. Within the large volumes of samples submitted every day to these services, some submissions appear to be different from others, and show interesting characteristics. For example, we observed that malware samples involved in famous targeted attacks – like the Regin APT framework or the recently disclosed malwares from the Equation Group – were submitted to our sandbox months or even years before they were detected in the wild. In other cases, the malware developers themselves interact with public sandboxes to test their creations or to develop a new evasion technique. We refer to similar cases as malware developments. In this paper, we propose a novel methodology to automatically identify malware development cases from the samples submitted to a malware analysis sandbox. The results of our experiments show that, by combining dynamic and static analysis with features based on the file submission, it is possible to achieve a good accuracy in automatically identifying cases of malware development. Our goal is to raise awareness on this problem and on the importance of looking at these samples from an intelligence and threat prevention point of view.

Needles in a Haystack: Mining Information from Public Dynamic Analysis Sandboxes for Malware Intelligence / M. Graziano, D. Canali, L. Bilge, A. Lanzi, D. Balzarotti - In: USENIX Security[s.l] : USENIX Association, 2015. - ISBN 9781931971232. - pp. 1057-1072 (( Intervento presentato al 24. convegno USENIX Security Symposium tenutosi a Washington nel 2015.

Needles in a Haystack: Mining Information from Public Dynamic Analysis Sandboxes for Malware Intelligence

A. Lanzi;
2015

Abstract

Malware sandboxes are automated dynamic analysis systems that execute programs in a controlled environment. Within the large volumes of samples submitted every day to these services, some submissions appear to be different from others, and show interesting characteristics. For example, we observed that malware samples involved in famous targeted attacks – like the Regin APT framework or the recently disclosed malwares from the Equation Group – were submitted to our sandbox months or even years before they were detected in the wild. In other cases, the malware developers themselves interact with public sandboxes to test their creations or to develop a new evasion technique. We refer to similar cases as malware developments. In this paper, we propose a novel methodology to automatically identify malware development cases from the samples submitted to a malware analysis sandbox. The results of our experiments show that, by combining dynamic and static analysis with features based on the file submission, it is possible to achieve a good accuracy in automatically identifying cases of malware development. Our goal is to raise awareness on this problem and on the importance of looking at these samples from an intelligence and threat prevention point of view.
Settore INF/01 - Informatica
2015
https://www.usenix.org/conference/usenixsecurity15/technical-sessions/presentation/graziano
Book Part (author)
File in questo prodotto:
File Dimensione Formato  
sec15-paper-graziano.pdf

accesso aperto

Tipologia: Publisher's version/PDF
Dimensione 652.9 kB
Formato Adobe PDF
652.9 kB Adobe PDF Visualizza/Apri
Pubblicazioni consigliate

I documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.

Utilizza questo identificativo per citare o creare un link a questo documento: https://hdl.handle.net/2434/455586
Citazioni
  • ???jsp.display-item.citation.pmc??? ND
  • Scopus 55
  • ???jsp.display-item.citation.isi??? 41
social impact