Large-Scale Analysis of Malware Downloaders
نویسندگان
چکیده
Downloaders are malicious programs with the goal to subversively download and install malware (eggs) on a victim’s machine. In this paper, we analyze and characterize 23 Windows-based malware downloaders. We first show a high diversity in downloaders’ communication architectures (e.g., P2P), carrier protocols and encryption schemes. Using dynamic malware analysis traces from over two years, we observe that 11 of these downloaders actively operated for at least one year, and identify 18 downloaders to be still active. We then describe how attackers choose resilient server infrastructures. For example, we reveal that 20% of the C&C servers remain operable on long term. Moreover, we observe steady migrations between different domains and TLD registrars, and notice attackers to deploy critical infrastructures redundantly across providers. After revealing the complexity of possible counter-measures against downloaders, we present two generic techniques enabling defenders to actively acquire malware samples. To do so, we leverage the publicly accessible downloader infrastructures by replaying download dialogs or observing a downloader’s process activities from within the Windows kernel. With these two techniques, we successfully milk and analyze a diverse set of eggs from downloaders with both plain and encrypted communication channels.
منابع مشابه
Catching Worms, Trojan Horses and PUPs: Unsupervised Detection of Silent Delivery Campaigns
The growing commoditization of the underground economy has given rise to malware delivery networks, which charge fees for quickly delivering malware or unwanted software to a large number of hosts. A key method to provide this service is through the orchestration of silent delivery campaigns. These campaigns involve a group of downloaders that receive remote commands and then deliver their payl...
متن کاملAcronis Active Protection Whitepaper
What is Ransomware? Ransomware is a type of malware that blocks access to some or all information that is stored on a device. In order to unlock the device or the data, the user is required to pay a ransom, usually in widely used e-currency. The term ransomware covers two types of malware: so-called Windows® blockers, which block the operating system or browser with a pop-up window, and encrypt...
متن کاملInsights into Malware Distribution with Graph Analytics
Malicious software (malware) destroys and steals access to users’ private computer systems, which can lead to breaches of sensitive personal information. It has been rapidly growing, spreading and infecting computer systems; it continues to be an active threat. Currently, more than 200 million unique variants of malware exist. Anti-virus is a software tool that is used to protect against attack...
متن کاملBitShred: Fast, Scalable Malware Triage
The sheer volume of new malware found each day is enormous. Worse, current trends show the amount of malware is doubling each year. The large-scale volume has created a need for automated large-scale triage techniques. Typical triage tasks include clustering malware into families and finding the nearest neighbor to a given malware. In this paper we propose efficient techniques for largescale ma...
متن کاملPerception of Delay and Attitude toward Feedback Display: An Exploration into Downloaders' Demographics
To cope with delay during an online download session, web service providers often present feedback cues to keep downloaders informed of progress. Yet, empirical work examining the downloaders’ perception of delay or their attitudes toward the feedback provided is scant. Moreover, only few studies have addressed the two variables in conjunction with downloaders’ demographics. This study intends ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2012