WaveAtlas: surfing through the landscape of current malware packers

Wednesday 30 September 16:30 - 17:00, Green room

Fanny Lalonde Lévesque (École Polytechnique de Montréal)
Erwann Traourouder (École Polytechnique de Montréal)
François Menet (École Polytechnique de Montréal)
Jean-Yves Marion (Université de Lorraine)
Jose M. Fernandez (École Polytechnique de Montréal)
Joan Calvet (ESET)

  download slides (PDF)

Obfuscation techniques have become increasingly prevalent in malware programs, employed as tools to thwart reverse engineering efforts or to evade signature-based detection by security products. Among the most popular methods, the use of packers - which are programs that transform an executable file's appearance without affecting its semantic execution - is now widely adopted by malware authors. However, despite the rise in the number of malicious programs distributed with packers, we still lack a global picture of their current use. What kind of packers protect malware nowadays? Is there a common model? Previous attempts, based on static database-signature tools, failed to build an accurate picture of the use of packers by malware, their main limitation being that static analysis says nothing about the actual behaviour of the packers and, due to its static nature, misses run-time features.

In this paper, we present WaveAtlas, a novel framework designed to map the code used by packers. Using a dynamic analysis approach, it reconstructs in a nutshell the structure of the code modification tree where the root is the packed code and packer, and the nodes represent snippets of code extracted in successive 'waves'. We report on a large-scale experiment conducted on a representative sample of thousands of pieces of self-modifying malicious code. Our results allowed us to successfully identify common features of malware packers, ranging from their self-modification code usage to exotic choices of machine instructions. In particular, we were able to confirm some commonly held beliefs regarding the use of packers by malware writers. For example, a malicious payload (e.g. code including network callbacks) is typically present in the last or penultimate wave. Furthermore, the number of waves is relatively small and the structure of the trees relatively simple, indicating that malware authors are probably using simpler tools and parameters as a compromise between stealth and efficiency.

Click here for more details about the conference.

Joan Calvet

Joan Calvet

Joan Calvet is a malware researcher working at ESET, where he is mainly involved in in-depth malware investigations. He defended his Ph.D. thesis in 2013, and has spoken at security conferences such as REcon, Virus Bulletin and DeepSec.

@joancalvet

Fanny Lalonde Lévesque

Fanny Lalonde Lévesque

Fanny Lalonde Lévesque is a Ph.D. student in the Department of Computer & Software Engineering at the École Polytechnique de Montréal. She received her B.Eng. in software engineering (2010) and her Masters of Applied Sciences (2013) from the École Polytechnique de Montréal. Her main research interests lie in security product testing methodologies and in identifying and understanding human and technological risk factors leading to malware infections.

Erwann Traourouder

Erwann Traourouder

Erwann Traourouder is a software engineer at Capgemini France. He did two years of malware research at the École Polytechnique de Montréal, after receiving his M.Sc. in computer security (2012) at the University of Rennes 1 and his B.Eng. in software engineering (2011) at the Institut National des Sciences Appliquées of Rouen (France).

José M. Fernandez

José M. Fernandez

José M. Fernandez is an Associate Professor at the École Polytechnique de Montréal. There, he leads the Laboratoire de Sécurité des Systèmes d'Information (SecSI) where he conducts research on Computer Security.

Jean-Yves Marion

Jean-Yves Marion

Jean-Yves Marion is professor of computer science at Lorraine University in Nancy on the north-east side of France. His research covers computer viruses. An objective of his research is to develop new tools to analyse malware, to identity functionality inside binary codes, and to classify malware. Recently, he has worked extensively on the disassembling process of self-moidfying x86-codes. He has also a strong interest on computer forensics. He is the head of the high security lab (HSL) and also the head of the computer science department of his university. He is a member of the prestigious Institut Universitaire de France (IUF).

 

We have placed cookies on your device in order to improve the functionality of this site, as outlined in our cookies policy. However, you may delete and block all cookies from this site and your use of the site will be unaffected. By continuing to browse this site, you are agreeing to Virus Bulletin's use of data as outlined in our privacy policy.