International Conference on Computing and Applied Informatics 2016 | |
Mal-Xtract: Hidden Code Extraction using Memory Analysis | |
物理学;计算机科学 | |
Lim, Charles^1 ; Syailendra Kotualubun, Yohanes^1 ; Suryadi^2 ; Ramli, Kalamullah^3 | |
Department of Information Technology, Swiss German University, Edutown BSD City, Tangerang | |
15339, Indonesia^1 | |
Department of Mathematics, Universitas Indonesia, Kampus UI, Depok | |
16424, Indonesia^2 | |
Department of Electrical Engineering, Universitas Indonesia, Kampus UI, Depok | |
16424, Indonesia^3 | |
关键词: Anti-malware; Code extraction; Malicious codes; Malware families; Memory analysis; Running-in; | |
Others : https://iopscience.iop.org/article/10.1088/1742-6596/801/1/012058/pdf DOI : 10.1088/1742-6596/801/1/012058 |
|
学科分类:计算机科学(综合) | |
来源: IOP | |
【 摘 要 】
Software packer has been used effectively to hide the original code inside a binary executable, making it more difficult for existing signature based anti malware software to detect malicious code inside the executable. A new method of written and rewritten memory section is introduced to to detect the exact end time of unpacking routine and extract original code from packed binary executable using Memory Analysis running in an software emulated environment. Our experiment results show that at least 97% of the original code from the various binary executable packed with different software packers could be extracted. The proposed method has also been successfully extracted hidden code from recent malware family samples.
【 预 览 】
Files | Size | Format | View |
---|---|---|---|
Mal-Xtract: Hidden Code Extraction using Memory Analysis | 1119KB | download |