Title :
Countering entropy measure attacks on packed software detection
Author :
Ugarte-Pedrero, Xabier ; Santos, Igor ; Sanz, Borja ; Laorden, Carlos ; Bringas, Pablo Garcia
Author_Institution :
S3Lab., Univ. of Deusto, Bilbao, Spain
Abstract :
Malware writers usually employ several techniques to evade detection. For the last years, the number of variants detected each day has increased significantly. Traditional approaches such as signature scanning, one of the most common techniques employed by anti-virus companies, are becoming inefficient for the high amount of samples found in the wild. In order to bypass this kind of filters, malware writers usually obfuscate and transform the code of their creations. One of the methods employed is executable packing, which consists in compressing or ciphering the real malicious code, and injecting a decryption routine into the executable that will load and decompress it at run-time. Entropy is a common heuristic for the detection of packed executables. High entropy values indicate a random distribution of the bytes that compose the executable, a property very common in compressed and ciphered data. Unfortunately, this entropy measure can be altered by different techniques that modify randomness. In this paper, we detail various attacks found on real Zeus family samples, one of the most powerful and spread malware families at this moment, which are protected by custom made packers. In addition, we describe a method for obtaining an alternative entropy measure more resilient to these techniques, and evaluate it for the classification of packed/not-packed executables, obtaining satisfactory detection and false positive rates.
Keywords :
cryptography; data compression; digital signatures; entropy; invasive software; pattern classification; software metrics; Zeus family samples; anti-virus companies; data cipher; data compression; decryption routine injection; entropy measure attacks; executable packing; malicious software; malware families; not-packed executable classification; packed executable classification; packed executable detection; packed software detection; real malicious code ciphering; real malicious code compression; satisfactory detection; signature scanning; Accuracy; Bars; Biological cells; Entropy; Histograms; Malware; Software;
Conference_Titel :
Consumer Communications and Networking Conference (CCNC), 2012 IEEE
Conference_Location :
Las Vegas, NV
Print_ISBN :
978-1-4577-2070-3
DOI :
10.1109/CCNC.2012.6181079