SysTaint: Assisting Reversing of Malicious Network Communications
Title | SysTaint: Assisting Reversing of Malicious Network Communications |
Publication Type | Conference Paper |
Year of Publication | 2018 |
Authors | Viglianisi, Gabriele, Carminati, Michele, Polino, Mario, Continella, Andrea, Zanero, Stefano |
Conference Name | Proceedings of the 8th Software Security, Protection, and Reverse Engineering Workshop |
Publisher | ACM |
Conference Location | New York, NY, USA |
ISBN Number | 978-1-4503-6096-8 |
Keywords | Botnet, communication protocol, Human Behavior, malware analysis, Metrics, pubcrawl, Resiliency, software reverse engineering, virtualization |
Abstract | The ever-increasing number of malware samples demands for automated tools that aid the analysts in the reverse engineering of complex malicious binaries. Frequently, malware communicates over an encrypted channel with external network resources under the control of malicious actors, such as Command and Control servers that control the botnet of infected machines. Hence, a key aspect in malware analysis is uncovering and understanding the semantics of network communications. In this paper we present SysTaint, a semi-automated tool that runs malware samples in a controlled environment and analyzes their execution to support the analyst in identifying the functions involved in the communication and the exchanged data. Our evaluation on four banking Trojan samples from different families shows that SysTaint is able to handle and inspect encrypted network communications, obtaining useful information on the data being sent and received, on how each sample processes this data, and on the inner portions of code that deal with the data processing. |
URL | http://doi.acm.org/10.1145/3289239.3289245 |
DOI | 10.1145/3289239.3289245 |
Citation Key | viglianisi_systaint:_2018 |