SlideShare una empresa de Scribd logo
1 de 22
Descargar para leer sin conexión
FFRI,Inc.

Monthly Research

Behavioral-based malware clustering
Fourteenforty Research Institute, Inc.
FFRI, Inc
http://www.ffri.jp

Ver2.00.01
FFRI,Inc.

Agenda
1.
2.
3.
4.
5.
6.
7.

Background and purpose
Overview of clustering
An experiment
The Result
Considerations
Conclusions
Future Works

2
FFRI,Inc.

1.Background and purpose
•

In recent year the number of malware has been extremely increased

•

It is hardly possible to analyze all malware manually
– req-1) Need to determine malware to analyze preferentially
(novel unique malware, etc.)
– req-2) Need to make analysis more efficiently
(referring similar malware information, code diffing, etc.)

•

In development of malware detection engines, it is difficult to use all the
collected malware for prototyping and testing
– req-3) Need to group malware and select representative samples

•

Evaluating behavioral-based clustering as a sort of methods to solve the problem

3
FFRI,Inc.

2.Overview of clustering
•

Dividing data into some clusters (groups) based on “features”
– “features” must be selected manually

•

Mainly there 2 types of clusterings
– Hierarchical clustering
• Considering each data as a cluster and merging them as a tree based
on similarities or distances
• The result is shown as dendrogram(tree)
• eg. single linkage, complete linkage, average linkage, ward, etc.
– Non hierarchical clustering
• Dividing data into some groups based on its similarity
• Hard clustering(data belong to a cluster) and Soft clustering
(data might belong to some clusters)
• eg. k-means, mixture model, NMF

4
FFRI,Inc.

2.Overview of clustering / Hierarchical clustering
# An example of dendrogram (alphabets on x-axis is corresponding to each datum)

unique

each pair is similar

5
FFRI,Inc.

2. Overview of clustering / Hierarchical clustering
# Capable of considering a result as N clusters depending on each depth

2clusters
3clusters
6clusters

6
FFRI,Inc.

3.An experiment
•

•

•

Applying ward’s method(hierarchical clustering)
– Most non hierarchical clusterings have to be specified a number of clusters
• Determining the best cluster size is also problem
– Using 3-gram of API-calls(no args) with weighting by tf-idf as features
Datasets
– Sampling 1,000 malware randomly from our collections
• Confirming the detection rate using VirusTotal based on hash values
• Most of vendors detect around 80% of them
Software
– Extracting each malware’s API-calls using Cuckoo Sandbox 0.6
– Using Scipy(and Matplotlib) for clustering

# tf-idf: http://ja.wikipedia.org/wiki/Tf-idf
# Scipy: http://www.scipy.org/
7
FFRI,Inc.

4.The result
•

Mainly it was divided into 3 clusters (green, red, light blue)

8
FFRI,Inc.

5.Considerations
a. Did the clustering work well?
(clustering data based on functions and behaviors)

b. Is it useful to determine novel unique malware? (req-1)
c. Does it boost manual malware analysis? (req-2)
d. Is it helpful to sample worthful data? (req-3)

9
FFRI,Inc.

5.Considerations / a. Did the clustering work well?
•

Selecting 3 pairs which are similar in the deepest level of clustering

•

Comparing both malware’s functions and behaviors for each pairs
– P-1(MD5 and detection name)
• aac95e967b1ce621bd2b1a5854d0294d (HEUR:Trojan.Win32.Generic)
• 69fcc9c0dca876307d97a64683936bad (Unknown)

– P-2
• 5dfca9602289f20f13902c4ed3710fb2 (HEUR:Trojan.Win32.Generic)
• 90c4af98638d7d9418f2e29f55ec6c9f (HEUR:Trojan.Win32.Generic)
– P-3
• 9f267ae8fb419f2071795803216a3455 (Trojan.Win32.Jorik.Buterat.nwr)
• dadcb4ab9827f66ba5bd350d78b902cc (Backdoor.Win32.Buterat.zqy)

10
FFRI,Inc.

P-1
•

Result
– Both malware might be belong to the same family, or they might be
generated by the same tool with different configurations

•

Common points
– Generating a 23148 bytes data file with same MD5 under
C:¥Windows¥Registration
– Accessed registry keys and created mutexes are identical
– Encoding method for accessing file is the same
– Containing ASCII strings in PE are mostly common
– Registering itself to the same 2 ASPEs(Auto-Start Extensibility Point)

•

Difference
– A dropped executable’s MD5 hash are different
– Detection statuses are much different(‘Unknown’ is mostly undetectable)

11
FFRI,Inc.

P-1 / Accessed registry keys (completely matched)
"keys": [
"HKEY_LOCAL_MACHINE¥¥Software¥¥Microsoft¥¥COM3",
"HKEY_LOCAL_MACHINE¥¥Software¥¥Classes",
"HKEY_LOCAL_MACHINE¥¥Software¥¥Classes¥¥CLSID",
"CLSID¥¥{304CE942-6E39-40D8-943A-B913C40C9CD4}",
"CLSID¥¥{304CE942-6E39-40D8-943A-B913C40C9CD4}¥¥TreatAs",
"¥¥CLSID¥¥{304CE942-6E39-40D8-943A-B913C40C9CD4}",
"¥¥CLSID¥¥{304CE942-6E39-40D8-943A-B913C40C9CD4}¥¥InprocServer32",
"¥¥CLSID¥¥{304CE942-6E39-40D8-943A-B913C40C9CD4}¥¥InprocServerX86",
"¥¥CLSID¥¥{304CE942-6E39-40D8-943A-B913C40C9CD4}¥¥LocalServer32",
"¥¥CLSID¥¥{304CE942-6E39-40D8-943A-B913C40C9CD4}¥¥InprocHandler32",
"¥¥CLSID¥¥{304CE942-6E39-40D8-943A-B913C40C9CD4}¥¥InprocHandlerX86",
"¥¥CLSID¥¥{304CE942-6E39-40D8-943A-B913C40C9CD4}¥¥LocalServer",
"HKEY_CLASSES_ROOT¥¥CLSID¥¥{304CE942-6E39-40D8-943A-B913C40C9CD4}",
"HKEY_CLASSES_ROOT¥¥CLSID¥¥{304CE942-6E39-40D8-943AB913C40C9CD4}¥¥TreatAs",
"HKEY_LOCAL_MACHINE¥¥Software¥¥Microsoft¥¥Rpc¥¥SecurityService",

"HKEY_LOCAL_MACHINE¥¥SYSTEM¥¥CurrentControlSet¥¥Services¥¥SharedAccess¥¥Parameters¥¥
FirewallPolicy¥¥StandardProfile",
"HKEY_LOCAL_MACHINE¥¥software¥¥microsoft¥¥windows nt¥¥currentversion¥¥winlogon",
"HKEY_CURRENT_USER¥¥software¥¥microsoft¥¥windows¥¥currentversion¥¥run"
],

12
FFRI,Inc.

P-2
•

Result
– Both malware might be belong to the same family, or they might be
generated by the same tool with different configurations

•

Common points
– The number of dropped files and MD5 and size for 4 out of the 6 files
– Accessed registry keys and files and created mutexes are identical
– Confirming registry settings for audio related keys such as aux, mixer
– Changing error reporting settings on Windows

•

Difference
– 2 out of the 6 files are different

13
FFRI,Inc.

P-2 / Accessed registry keys (completely matched)
"keys": [
"HKEY_LOCAL_MACHINE¥¥Software¥¥Microsoft¥¥Windows NT¥¥CurrentVersion¥¥IMM",
"HKEY_CURRENT_USER¥¥SOFTWARE¥¥Microsoft¥¥CTF",
"HKEY_LOCAL_MACHINE¥¥Software¥¥Microsoft¥¥CTF¥¥SystemShared",
...
"Drivers¥¥wave",
"Drivers¥¥wave¥¥wdmaud.drv",
"Drivers¥¥midi",
"Drivers¥¥midi¥¥wdmaud.drv",
"Drivers¥¥aux",
"Drivers¥¥aux¥¥wdmaud.drv",
"Drivers¥¥mixer",
"Drivers¥¥mixer¥¥wdmaud.drv",
...
"HKEY_LOCAL_MACHINE¥¥Software¥¥Policies¥¥Microsoft¥¥PCHealth¥¥ErrorReporting",
"HKEY_LOCAL_MACHINE¥¥Software¥¥Microsoft¥¥PCHealth¥¥ErrorReporting",
"HKEY_LOCAL_MACHINE¥¥Software¥¥Microsoft¥¥PCHealth¥¥ErrorReporting¥¥ExclusionList",
"HKEY_LOCAL_MACHINE¥¥Software¥¥Microsoft¥¥PCHealth¥¥ErrorReporting¥¥InclusionList",
"HKEY_LOCAL_MACHINE¥¥System¥¥Setup"
],

14
FFRI,Inc.

P-3
•

Result
– Both malware might be belong to the same family, or they might be
generated by the same tool with different configurations.
– Same attacker might generate both malware in different period because
of appearance of a common C&C FQDN

•

Common points
– The number of dropped files and MD5 and size for 4 out of the 6 files
– Accessed registry keys and files and created mutexes are identical
– Changing the same IE and explorer settings
– C&C FQDN is the same (sharing one identical C&C FQDN where each
malware has 3 C&C FQDN)
– Process tree in execution is the same

•

Difference
– 2 C&C FQDNs out of the 3 are different

15
FFRI,Inc.

P-3 / Process tree
{
"pid": 404,
"name": "9F267AE8FB419F2071795803216A3455.bin",
"children": [
{
"pid": 388,
"name": "9F267AE8FB419F2071795803216A3455.bin",
"children": [
{
"pid": 1832,
"name": "taskhost.exe",
"children": [
{
"pid": 1828,
"name": "taskhost.exe",
"children": []
}
]
}
]
}
]

}

16
FFRI,Inc.

5.Considerations /
•

Is it useful to determine novel unique malware?

Following malware is likely to novel unique ones if we assume that clustering
works well based on the result above

– Undetectable by current anti-virus software
– As a result of clustering, it is represented by unique or sparse tree

If this malware is undetectable,
It is possibly new malware

17
FFRI,Inc.

5.Considerations / Does it boost manual malware analysis?
•

If unknown malware are making up a group in a cluster, their functions and
behaviors also should be similar (It would be helpful to analyze them)

•

Malware detected by heuristic engines are also able to be classified more
accurately
– We confirmed the same "HEUR"-prefixed malware is classified to another
family

18
FFRI,Inc.

5.Considerations / Is it helpful to sample worthful data?
•

We can consider dividing data into arbitrary sized clusters and sampling data
from each clusters

•

Especially if trend of each clusters are different, it is useful
– Stratified sampling
• http://en.wikipedia.org/wiki/Stratified_sampling

19
FFRI,Inc.

6.Conclusions
•

Need to consider schemes to use malware as assets since increasing of
malware

•

Therefore, we evaluated clustering with ward’s method

•

In limited evaluation, we confirmed it works well

•

We
–
–
–

can solve the requests using this result
Determining malware to analyze preferentially
Making analysis more efficiently
Valuable malware sampling

20
FFRI,Inc.

7.Future works
•

Comparing other features and methods

•

Considering methods to compare malware behaviors and functions
– MAEC(Malware Attribute Enumeration and Characterization) might be useful
– http://maec.mitre.org/

•

More user-friendly UI/IF for a result of clustering

•

Considering automation and systematization

21
FFRI,Inc.

Contact Information
• E-Mail: research-feedback@ffri.jp
• twitter: @FFRI_Research

22

Más contenido relacionado

La actualidad más candente

[HITCON 2020 CTI Village] Threat Hunting and Campaign Tracking Workshop.pptx
[HITCON 2020 CTI Village] Threat Hunting and Campaign Tracking Workshop.pptx[HITCON 2020 CTI Village] Threat Hunting and Campaign Tracking Workshop.pptx
[HITCON 2020 CTI Village] Threat Hunting and Campaign Tracking Workshop.pptxChi En (Ashley) Shen
 
Ring 0/-2 Rootkits: bypassing defenses -- DEF CON 2018 USA
Ring 0/-2 Rootkits: bypassing defenses  -- DEF CON 2018 USARing 0/-2 Rootkits: bypassing defenses  -- DEF CON 2018 USA
Ring 0/-2 Rootkits: bypassing defenses -- DEF CON 2018 USAAlexandre Borges
 
Introducing ArTHIR - ATT&CK Remote Threat Hunting Incident Response Windows tool
Introducing ArTHIR - ATT&CK Remote Threat Hunting Incident Response Windows toolIntroducing ArTHIR - ATT&CK Remote Threat Hunting Incident Response Windows tool
Introducing ArTHIR - ATT&CK Remote Threat Hunting Incident Response Windows toolMichael Gough
 
Plant ontology web services on Araport
Plant ontology web services on AraportPlant ontology web services on Araport
Plant ontology web services on AraportAraport
 
Vaughn aip walkthru_pag2015
Vaughn aip walkthru_pag2015Vaughn aip walkthru_pag2015
Vaughn aip walkthru_pag2015Araport
 
ICAR 2015 Workshop - Nick Provart
ICAR 2015 Workshop - Nick ProvartICAR 2015 Workshop - Nick Provart
ICAR 2015 Workshop - Nick ProvartAraport
 
Securing Neural Networks
Securing Neural NetworksSecuring Neural Networks
Securing Neural NetworksTahseen Shabab
 
Basic Dynamic Analysis of Malware
Basic Dynamic Analysis of MalwareBasic Dynamic Analysis of Malware
Basic Dynamic Analysis of MalwareNatraj G
 
Splunk Enterprise for Information Security Hands-On Breakout Session
Splunk Enterprise for Information Security Hands-On Breakout SessionSplunk Enterprise for Information Security Hands-On Breakout Session
Splunk Enterprise for Information Security Hands-On Breakout SessionSplunk
 
From Genomics to Medicine: Advancing Healthcare at Scale
From Genomics to Medicine: Advancing Healthcare at ScaleFrom Genomics to Medicine: Advancing Healthcare at Scale
From Genomics to Medicine: Advancing Healthcare at ScaleDatabricks
 
Tick group @avar2019 20191111 cha minseok_publish
Tick group @avar2019 20191111 cha minseok_publishTick group @avar2019 20191111 cha minseok_publish
Tick group @avar2019 20191111 cha minseok_publishMinseok(Jacky) Cha
 
ICAR 2015 Workshop - Agnes Chan
ICAR 2015 Workshop - Agnes ChanICAR 2015 Workshop - Agnes Chan
ICAR 2015 Workshop - Agnes ChanAraport
 
Creating Your Own Threat Intel Through Hunting & Visualization
Creating Your Own Threat Intel Through Hunting & VisualizationCreating Your Own Threat Intel Through Hunting & Visualization
Creating Your Own Threat Intel Through Hunting & VisualizationRaffael Marty
 
PHDays 2018 Threat Hunting Hands-On Lab
PHDays 2018 Threat Hunting Hands-On LabPHDays 2018 Threat Hunting Hands-On Lab
PHDays 2018 Threat Hunting Hands-On LabTeymur Kheirkhabarov
 
Malware Static Analysis
Malware Static AnalysisMalware Static Analysis
Malware Static AnalysisHossein Yavari
 
Applied Detection and Analysis Using Flow Data - MIRCon 2014
Applied Detection and Analysis Using Flow Data - MIRCon 2014Applied Detection and Analysis Using Flow Data - MIRCon 2014
Applied Detection and Analysis Using Flow Data - MIRCon 2014chrissanders88
 
FastQC and Prinseqlite
FastQC and PrinseqliteFastQC and Prinseqlite
FastQC and PrinseqliteRavi Gandham
 
The top 10 windows logs event id's used v1.0
The top 10 windows logs event id's used v1.0The top 10 windows logs event id's used v1.0
The top 10 windows logs event id's used v1.0Michael Gough
 
Conf2014_SplunkSecurityNinjutsu
Conf2014_SplunkSecurityNinjutsuConf2014_SplunkSecurityNinjutsu
Conf2014_SplunkSecurityNinjutsuSplunk
 
2016 bioinformatics i_io_wim_vancriekinge
2016 bioinformatics i_io_wim_vancriekinge2016 bioinformatics i_io_wim_vancriekinge
2016 bioinformatics i_io_wim_vancriekingeProf. Wim Van Criekinge
 

La actualidad más candente (20)

[HITCON 2020 CTI Village] Threat Hunting and Campaign Tracking Workshop.pptx
[HITCON 2020 CTI Village] Threat Hunting and Campaign Tracking Workshop.pptx[HITCON 2020 CTI Village] Threat Hunting and Campaign Tracking Workshop.pptx
[HITCON 2020 CTI Village] Threat Hunting and Campaign Tracking Workshop.pptx
 
Ring 0/-2 Rootkits: bypassing defenses -- DEF CON 2018 USA
Ring 0/-2 Rootkits: bypassing defenses  -- DEF CON 2018 USARing 0/-2 Rootkits: bypassing defenses  -- DEF CON 2018 USA
Ring 0/-2 Rootkits: bypassing defenses -- DEF CON 2018 USA
 
Introducing ArTHIR - ATT&CK Remote Threat Hunting Incident Response Windows tool
Introducing ArTHIR - ATT&CK Remote Threat Hunting Incident Response Windows toolIntroducing ArTHIR - ATT&CK Remote Threat Hunting Incident Response Windows tool
Introducing ArTHIR - ATT&CK Remote Threat Hunting Incident Response Windows tool
 
Plant ontology web services on Araport
Plant ontology web services on AraportPlant ontology web services on Araport
Plant ontology web services on Araport
 
Vaughn aip walkthru_pag2015
Vaughn aip walkthru_pag2015Vaughn aip walkthru_pag2015
Vaughn aip walkthru_pag2015
 
ICAR 2015 Workshop - Nick Provart
ICAR 2015 Workshop - Nick ProvartICAR 2015 Workshop - Nick Provart
ICAR 2015 Workshop - Nick Provart
 
Securing Neural Networks
Securing Neural NetworksSecuring Neural Networks
Securing Neural Networks
 
Basic Dynamic Analysis of Malware
Basic Dynamic Analysis of MalwareBasic Dynamic Analysis of Malware
Basic Dynamic Analysis of Malware
 
Splunk Enterprise for Information Security Hands-On Breakout Session
Splunk Enterprise for Information Security Hands-On Breakout SessionSplunk Enterprise for Information Security Hands-On Breakout Session
Splunk Enterprise for Information Security Hands-On Breakout Session
 
From Genomics to Medicine: Advancing Healthcare at Scale
From Genomics to Medicine: Advancing Healthcare at ScaleFrom Genomics to Medicine: Advancing Healthcare at Scale
From Genomics to Medicine: Advancing Healthcare at Scale
 
Tick group @avar2019 20191111 cha minseok_publish
Tick group @avar2019 20191111 cha minseok_publishTick group @avar2019 20191111 cha minseok_publish
Tick group @avar2019 20191111 cha minseok_publish
 
ICAR 2015 Workshop - Agnes Chan
ICAR 2015 Workshop - Agnes ChanICAR 2015 Workshop - Agnes Chan
ICAR 2015 Workshop - Agnes Chan
 
Creating Your Own Threat Intel Through Hunting & Visualization
Creating Your Own Threat Intel Through Hunting & VisualizationCreating Your Own Threat Intel Through Hunting & Visualization
Creating Your Own Threat Intel Through Hunting & Visualization
 
PHDays 2018 Threat Hunting Hands-On Lab
PHDays 2018 Threat Hunting Hands-On LabPHDays 2018 Threat Hunting Hands-On Lab
PHDays 2018 Threat Hunting Hands-On Lab
 
Malware Static Analysis
Malware Static AnalysisMalware Static Analysis
Malware Static Analysis
 
Applied Detection and Analysis Using Flow Data - MIRCon 2014
Applied Detection and Analysis Using Flow Data - MIRCon 2014Applied Detection and Analysis Using Flow Data - MIRCon 2014
Applied Detection and Analysis Using Flow Data - MIRCon 2014
 
FastQC and Prinseqlite
FastQC and PrinseqliteFastQC and Prinseqlite
FastQC and Prinseqlite
 
The top 10 windows logs event id's used v1.0
The top 10 windows logs event id's used v1.0The top 10 windows logs event id's used v1.0
The top 10 windows logs event id's used v1.0
 
Conf2014_SplunkSecurityNinjutsu
Conf2014_SplunkSecurityNinjutsuConf2014_SplunkSecurityNinjutsu
Conf2014_SplunkSecurityNinjutsu
 
2016 bioinformatics i_io_wim_vancriekinge
2016 bioinformatics i_io_wim_vancriekinge2016 bioinformatics i_io_wim_vancriekinge
2016 bioinformatics i_io_wim_vancriekinge
 

Destacado (6)

Lesson 4
Lesson 4Lesson 4
Lesson 4
 
Obtenir l’acceptation de la communauté
Obtenir l’acceptation de la communautéObtenir l’acceptation de la communauté
Obtenir l’acceptation de la communauté
 
Working In Canada Tool French
Working In  Canada Tool FrenchWorking In  Canada Tool French
Working In Canada Tool French
 
Assignment 13
Assignment 13Assignment 13
Assignment 13
 
Changelog
ChangelogChangelog
Changelog
 
Initiative des collectivités EQuilibrium(MC)
Initiative des collectivités EQuilibrium(MC)Initiative des collectivités EQuilibrium(MC)
Initiative des collectivités EQuilibrium(MC)
 

Similar a Mr201311 behavioral-based malware clustering (English)

Malware Classification and Analysis
Malware Classification and AnalysisMalware Classification and Analysis
Malware Classification and AnalysisPrashant Chopra
 
SANS Digital Forensics and Incident Response Poster 2012
SANS Digital Forensics and Incident Response Poster 2012SANS Digital Forensics and Incident Response Poster 2012
SANS Digital Forensics and Incident Response Poster 2012Rian Yulian
 
Full-System Emulation Achieving Successful Automated Dynamic Analysis of Evas...
Full-System Emulation Achieving Successful Automated Dynamic Analysis of Evas...Full-System Emulation Achieving Successful Automated Dynamic Analysis of Evas...
Full-System Emulation Achieving Successful Automated Dynamic Analysis of Evas...Lastline, Inc.
 
Design and Development of an Efficient Malware Detection Using ML
Design and Development of an Efficient Malware Detection Using MLDesign and Development of an Efficient Malware Detection Using ML
Design and Development of an Efficient Malware Detection Using MLSiva krishnam raju Patsamatla
 
Cyber Defense Forensic Analyst - Real World Hands-on Examples
Cyber Defense Forensic Analyst - Real World Hands-on ExamplesCyber Defense Forensic Analyst - Real World Hands-on Examples
Cyber Defense Forensic Analyst - Real World Hands-on ExamplesSandeep Kumar Seeram
 
Syed Ubaid Ali Jafri - Black Box Penetration testing for Associates
Syed Ubaid Ali Jafri - Black Box Penetration testing for AssociatesSyed Ubaid Ali Jafri - Black Box Penetration testing for Associates
Syed Ubaid Ali Jafri - Black Box Penetration testing for AssociatesSyed Ubaid Ali Jafri
 
Zero day malware detection
Zero day malware detectionZero day malware detection
Zero day malware detectionsujeeshkumarj
 
BSides IR in Heterogeneous Environment
BSides IR in Heterogeneous EnvironmentBSides IR in Heterogeneous Environment
BSides IR in Heterogeneous EnvironmentStefano Maccaglia
 
Building next gen malware behavioural analysis environment
Building next gen malware behavioural analysis environment Building next gen malware behavioural analysis environment
Building next gen malware behavioural analysis environment isc2-hellenic
 
A STATIC MALWARE DETECTION SYSTEM USING DATA MINING METHODS
A STATIC MALWARE DETECTION SYSTEM USING DATA MINING METHODSA STATIC MALWARE DETECTION SYSTEM USING DATA MINING METHODS
A STATIC MALWARE DETECTION SYSTEM USING DATA MINING METHODSijaia
 
Improving accuracy of malware detection by filtering evaluation dataset based...
Improving accuracy of malware detection by filtering evaluation dataset based...Improving accuracy of malware detection by filtering evaluation dataset based...
Improving accuracy of malware detection by filtering evaluation dataset based...FFRI, Inc.
 
Introduction To Ethical Hacking
Introduction To Ethical HackingIntroduction To Ethical Hacking
Introduction To Ethical HackingRaghav Bisht
 
01 Metasploit kung fu introduction
01 Metasploit kung fu introduction01 Metasploit kung fu introduction
01 Metasploit kung fu introductionMostafa Abdel-sallam
 
Malware Detection Using Data Mining Techniques
Malware Detection Using Data Mining Techniques Malware Detection Using Data Mining Techniques
Malware Detection Using Data Mining Techniques Akash Karwande
 
Classification with R
Classification with RClassification with R
Classification with RNajima Begum
 
RIoT (Raiding Internet of Things) by Jacob Holcomb
RIoT  (Raiding Internet of Things)  by Jacob HolcombRIoT  (Raiding Internet of Things)  by Jacob Holcomb
RIoT (Raiding Internet of Things) by Jacob HolcombPriyanka Aash
 
Classification of Malware based on Data Mining Approach
Classification of Malware based on Data Mining ApproachClassification of Malware based on Data Mining Approach
Classification of Malware based on Data Mining Approachijsrd.com
 
"Быстрое обнаружение вредоносного ПО для Android с помощью машинного обучения...
"Быстрое обнаружение вредоносного ПО для Android с помощью машинного обучения..."Быстрое обнаружение вредоносного ПО для Android с помощью машинного обучения...
"Быстрое обнаружение вредоносного ПО для Android с помощью машинного обучения...Yandex
 
Fast detection of Android malware: machine learning approach
Fast detection of Android malware: machine learning approachFast detection of Android malware: machine learning approach
Fast detection of Android malware: machine learning approachYury Leonychev
 

Similar a Mr201311 behavioral-based malware clustering (English) (20)

Malware Classification and Analysis
Malware Classification and AnalysisMalware Classification and Analysis
Malware Classification and Analysis
 
SANS Digital Forensics and Incident Response Poster 2012
SANS Digital Forensics and Incident Response Poster 2012SANS Digital Forensics and Incident Response Poster 2012
SANS Digital Forensics and Incident Response Poster 2012
 
Full-System Emulation Achieving Successful Automated Dynamic Analysis of Evas...
Full-System Emulation Achieving Successful Automated Dynamic Analysis of Evas...Full-System Emulation Achieving Successful Automated Dynamic Analysis of Evas...
Full-System Emulation Achieving Successful Automated Dynamic Analysis of Evas...
 
Design and Development of an Efficient Malware Detection Using ML
Design and Development of an Efficient Malware Detection Using MLDesign and Development of an Efficient Malware Detection Using ML
Design and Development of an Efficient Malware Detection Using ML
 
Cyber Defense Forensic Analyst - Real World Hands-on Examples
Cyber Defense Forensic Analyst - Real World Hands-on ExamplesCyber Defense Forensic Analyst - Real World Hands-on Examples
Cyber Defense Forensic Analyst - Real World Hands-on Examples
 
Syed Ubaid Ali Jafri - Black Box Penetration testing for Associates
Syed Ubaid Ali Jafri - Black Box Penetration testing for AssociatesSyed Ubaid Ali Jafri - Black Box Penetration testing for Associates
Syed Ubaid Ali Jafri - Black Box Penetration testing for Associates
 
Zero day malware detection
Zero day malware detectionZero day malware detection
Zero day malware detection
 
BSides IR in Heterogeneous Environment
BSides IR in Heterogeneous EnvironmentBSides IR in Heterogeneous Environment
BSides IR in Heterogeneous Environment
 
Building next gen malware behavioural analysis environment
Building next gen malware behavioural analysis environment Building next gen malware behavioural analysis environment
Building next gen malware behavioural analysis environment
 
A STATIC MALWARE DETECTION SYSTEM USING DATA MINING METHODS
A STATIC MALWARE DETECTION SYSTEM USING DATA MINING METHODSA STATIC MALWARE DETECTION SYSTEM USING DATA MINING METHODS
A STATIC MALWARE DETECTION SYSTEM USING DATA MINING METHODS
 
Improving accuracy of malware detection by filtering evaluation dataset based...
Improving accuracy of malware detection by filtering evaluation dataset based...Improving accuracy of malware detection by filtering evaluation dataset based...
Improving accuracy of malware detection by filtering evaluation dataset based...
 
Introduction To Ethical Hacking
Introduction To Ethical HackingIntroduction To Ethical Hacking
Introduction To Ethical Hacking
 
01 Metasploit kung fu introduction
01 Metasploit kung fu introduction01 Metasploit kung fu introduction
01 Metasploit kung fu introduction
 
Malware Detection Using Data Mining Techniques
Malware Detection Using Data Mining Techniques Malware Detection Using Data Mining Techniques
Malware Detection Using Data Mining Techniques
 
Classification with R
Classification with RClassification with R
Classification with R
 
RIoT (Raiding Internet of Things) by Jacob Holcomb
RIoT  (Raiding Internet of Things)  by Jacob HolcombRIoT  (Raiding Internet of Things)  by Jacob Holcomb
RIoT (Raiding Internet of Things) by Jacob Holcomb
 
Malware Analysis
Malware AnalysisMalware Analysis
Malware Analysis
 
Classification of Malware based on Data Mining Approach
Classification of Malware based on Data Mining ApproachClassification of Malware based on Data Mining Approach
Classification of Malware based on Data Mining Approach
 
"Быстрое обнаружение вредоносного ПО для Android с помощью машинного обучения...
"Быстрое обнаружение вредоносного ПО для Android с помощью машинного обучения..."Быстрое обнаружение вредоносного ПО для Android с помощью машинного обучения...
"Быстрое обнаружение вредоносного ПО для Android с помощью машинного обучения...
 
Fast detection of Android malware: machine learning approach
Fast detection of Android malware: machine learning approachFast detection of Android malware: machine learning approach
Fast detection of Android malware: machine learning approach
 

Más de FFRI, Inc.

Appearances are deceiving: Novel offensive techniques in Windows 10/11 on ARM
Appearances are deceiving: Novel offensive techniques in Windows 10/11 on ARMAppearances are deceiving: Novel offensive techniques in Windows 10/11 on ARM
Appearances are deceiving: Novel offensive techniques in Windows 10/11 on ARMFFRI, Inc.
 
Appearances are deceiving: Novel offensive techniques in Windows 10/11 on ARM
Appearances are deceiving: Novel offensive techniques in Windows 10/11 on ARMAppearances are deceiving: Novel offensive techniques in Windows 10/11 on ARM
Appearances are deceiving: Novel offensive techniques in Windows 10/11 on ARMFFRI, Inc.
 
TrustZone use case and trend (FFRI Monthly Research Mar 2017)
TrustZone use case and trend (FFRI Monthly Research Mar 2017) TrustZone use case and trend (FFRI Monthly Research Mar 2017)
TrustZone use case and trend (FFRI Monthly Research Mar 2017) FFRI, Inc.
 
Android Things Security Research in Developer Preview 2 (FFRI Monthly Researc...
Android Things Security Research in Developer Preview 2 (FFRI Monthly Researc...Android Things Security Research in Developer Preview 2 (FFRI Monthly Researc...
Android Things Security Research in Developer Preview 2 (FFRI Monthly Researc...FFRI, Inc.
 
An Overview of the Android Things Security (FFRI Monthly Research Jan 2017)
An Overview of the Android Things Security (FFRI Monthly Research Jan 2017) An Overview of the Android Things Security (FFRI Monthly Research Jan 2017)
An Overview of the Android Things Security (FFRI Monthly Research Jan 2017) FFRI, Inc.
 
Black Hat Europe 2016 Survey Report (FFRI Monthly Research Dec 2016)
Black Hat Europe 2016 Survey Report (FFRI Monthly Research Dec 2016) Black Hat Europe 2016 Survey Report (FFRI Monthly Research Dec 2016)
Black Hat Europe 2016 Survey Report (FFRI Monthly Research Dec 2016) FFRI, Inc.
 
An Example of use the Threat Modeling Tool (FFRI Monthly Research Nov 2016)
An Example of use the Threat Modeling Tool (FFRI Monthly Research Nov 2016)An Example of use the Threat Modeling Tool (FFRI Monthly Research Nov 2016)
An Example of use the Threat Modeling Tool (FFRI Monthly Research Nov 2016)FFRI, Inc.
 
STRIDE Variants and Security Requirements-based Threat Analysis (FFRI Monthly...
STRIDE Variants and Security Requirements-based Threat Analysis (FFRI Monthly...STRIDE Variants and Security Requirements-based Threat Analysis (FFRI Monthly...
STRIDE Variants and Security Requirements-based Threat Analysis (FFRI Monthly...FFRI, Inc.
 
Introduction of Threat Analysis Methods(FFRI Monthly Research 2016.9)
Introduction of Threat Analysis Methods(FFRI Monthly Research 2016.9)Introduction of Threat Analysis Methods(FFRI Monthly Research 2016.9)
Introduction of Threat Analysis Methods(FFRI Monthly Research 2016.9)FFRI, Inc.
 
Black Hat USA 2016 Survey Report (FFRI Monthly Research 2016.8)
Black Hat USA 2016  Survey Report (FFRI Monthly Research 2016.8)Black Hat USA 2016  Survey Report (FFRI Monthly Research 2016.8)
Black Hat USA 2016 Survey Report (FFRI Monthly Research 2016.8)FFRI, Inc.
 
About security assessment framework “CHIPSEC” (FFRI Monthly Research 2016.7)
About security assessment framework “CHIPSEC” (FFRI Monthly Research 2016.7) About security assessment framework “CHIPSEC” (FFRI Monthly Research 2016.7)
About security assessment framework “CHIPSEC” (FFRI Monthly Research 2016.7) FFRI, Inc.
 
Black Hat USA 2016 Pre-Survey (FFRI Monthly Research 2016.6)
Black Hat USA 2016 Pre-Survey (FFRI Monthly Research 2016.6)Black Hat USA 2016 Pre-Survey (FFRI Monthly Research 2016.6)
Black Hat USA 2016 Pre-Survey (FFRI Monthly Research 2016.6)FFRI, Inc.
 
Black Hat Asia 2016 Survey Report (FFRI Monthly Research 2016.4)
Black Hat Asia 2016 Survey Report (FFRI Monthly Research 2016.4)Black Hat Asia 2016 Survey Report (FFRI Monthly Research 2016.4)
Black Hat Asia 2016 Survey Report (FFRI Monthly Research 2016.4)FFRI, Inc.
 
ARMv8-M TrustZone: A New Security Feature for Embedded Systems (FFRI Monthly ...
ARMv8-M TrustZone: A New Security Feature for Embedded Systems (FFRI Monthly ...ARMv8-M TrustZone: A New Security Feature for Embedded Systems (FFRI Monthly ...
ARMv8-M TrustZone: A New Security Feature for Embedded Systems (FFRI Monthly ...FFRI, Inc.
 
CODE BLUE 2015 Report (FFRI Monthly Research 2015.11)
CODE BLUE 2015 Report (FFRI Monthly Research 2015.11)CODE BLUE 2015 Report (FFRI Monthly Research 2015.11)
CODE BLUE 2015 Report (FFRI Monthly Research 2015.11)FFRI, Inc.
 
Latest Security Reports of Automobile and Vulnerability Assessment by CVSS v3...
Latest Security Reports of Automobile and Vulnerability Assessment by CVSS v3...Latest Security Reports of Automobile and Vulnerability Assessment by CVSS v3...
Latest Security Reports of Automobile and Vulnerability Assessment by CVSS v3...FFRI, Inc.
 
Black Hat USA 2015 Survey Report (FFRI Monthly Research 201508)
Black Hat USA 2015 Survey Report (FFRI Monthly Research 201508)Black Hat USA 2015 Survey Report (FFRI Monthly Research 201508)
Black Hat USA 2015 Survey Report (FFRI Monthly Research 201508)FFRI, Inc.
 
A Survey of Threats in OS X and iOS(FFRI Monthly Research 201507)
A Survey of Threats in OS X and iOS(FFRI Monthly Research 201507)A Survey of Threats in OS X and iOS(FFRI Monthly Research 201507)
A Survey of Threats in OS X and iOS(FFRI Monthly Research 201507)FFRI, Inc.
 
Security of Windows 10 IoT Core(FFRI Monthly Research 201506)
Security of Windows 10 IoT Core(FFRI Monthly Research 201506)Security of Windows 10 IoT Core(FFRI Monthly Research 201506)
Security of Windows 10 IoT Core(FFRI Monthly Research 201506)FFRI, Inc.
 
Trend of Next-Gen In-Vehicle Network Standard and Current State of Security(F...
Trend of Next-Gen In-Vehicle Network Standard and Current State of Security(F...Trend of Next-Gen In-Vehicle Network Standard and Current State of Security(F...
Trend of Next-Gen In-Vehicle Network Standard and Current State of Security(F...FFRI, Inc.
 

Más de FFRI, Inc. (20)

Appearances are deceiving: Novel offensive techniques in Windows 10/11 on ARM
Appearances are deceiving: Novel offensive techniques in Windows 10/11 on ARMAppearances are deceiving: Novel offensive techniques in Windows 10/11 on ARM
Appearances are deceiving: Novel offensive techniques in Windows 10/11 on ARM
 
Appearances are deceiving: Novel offensive techniques in Windows 10/11 on ARM
Appearances are deceiving: Novel offensive techniques in Windows 10/11 on ARMAppearances are deceiving: Novel offensive techniques in Windows 10/11 on ARM
Appearances are deceiving: Novel offensive techniques in Windows 10/11 on ARM
 
TrustZone use case and trend (FFRI Monthly Research Mar 2017)
TrustZone use case and trend (FFRI Monthly Research Mar 2017) TrustZone use case and trend (FFRI Monthly Research Mar 2017)
TrustZone use case and trend (FFRI Monthly Research Mar 2017)
 
Android Things Security Research in Developer Preview 2 (FFRI Monthly Researc...
Android Things Security Research in Developer Preview 2 (FFRI Monthly Researc...Android Things Security Research in Developer Preview 2 (FFRI Monthly Researc...
Android Things Security Research in Developer Preview 2 (FFRI Monthly Researc...
 
An Overview of the Android Things Security (FFRI Monthly Research Jan 2017)
An Overview of the Android Things Security (FFRI Monthly Research Jan 2017) An Overview of the Android Things Security (FFRI Monthly Research Jan 2017)
An Overview of the Android Things Security (FFRI Monthly Research Jan 2017)
 
Black Hat Europe 2016 Survey Report (FFRI Monthly Research Dec 2016)
Black Hat Europe 2016 Survey Report (FFRI Monthly Research Dec 2016) Black Hat Europe 2016 Survey Report (FFRI Monthly Research Dec 2016)
Black Hat Europe 2016 Survey Report (FFRI Monthly Research Dec 2016)
 
An Example of use the Threat Modeling Tool (FFRI Monthly Research Nov 2016)
An Example of use the Threat Modeling Tool (FFRI Monthly Research Nov 2016)An Example of use the Threat Modeling Tool (FFRI Monthly Research Nov 2016)
An Example of use the Threat Modeling Tool (FFRI Monthly Research Nov 2016)
 
STRIDE Variants and Security Requirements-based Threat Analysis (FFRI Monthly...
STRIDE Variants and Security Requirements-based Threat Analysis (FFRI Monthly...STRIDE Variants and Security Requirements-based Threat Analysis (FFRI Monthly...
STRIDE Variants and Security Requirements-based Threat Analysis (FFRI Monthly...
 
Introduction of Threat Analysis Methods(FFRI Monthly Research 2016.9)
Introduction of Threat Analysis Methods(FFRI Monthly Research 2016.9)Introduction of Threat Analysis Methods(FFRI Monthly Research 2016.9)
Introduction of Threat Analysis Methods(FFRI Monthly Research 2016.9)
 
Black Hat USA 2016 Survey Report (FFRI Monthly Research 2016.8)
Black Hat USA 2016  Survey Report (FFRI Monthly Research 2016.8)Black Hat USA 2016  Survey Report (FFRI Monthly Research 2016.8)
Black Hat USA 2016 Survey Report (FFRI Monthly Research 2016.8)
 
About security assessment framework “CHIPSEC” (FFRI Monthly Research 2016.7)
About security assessment framework “CHIPSEC” (FFRI Monthly Research 2016.7) About security assessment framework “CHIPSEC” (FFRI Monthly Research 2016.7)
About security assessment framework “CHIPSEC” (FFRI Monthly Research 2016.7)
 
Black Hat USA 2016 Pre-Survey (FFRI Monthly Research 2016.6)
Black Hat USA 2016 Pre-Survey (FFRI Monthly Research 2016.6)Black Hat USA 2016 Pre-Survey (FFRI Monthly Research 2016.6)
Black Hat USA 2016 Pre-Survey (FFRI Monthly Research 2016.6)
 
Black Hat Asia 2016 Survey Report (FFRI Monthly Research 2016.4)
Black Hat Asia 2016 Survey Report (FFRI Monthly Research 2016.4)Black Hat Asia 2016 Survey Report (FFRI Monthly Research 2016.4)
Black Hat Asia 2016 Survey Report (FFRI Monthly Research 2016.4)
 
ARMv8-M TrustZone: A New Security Feature for Embedded Systems (FFRI Monthly ...
ARMv8-M TrustZone: A New Security Feature for Embedded Systems (FFRI Monthly ...ARMv8-M TrustZone: A New Security Feature for Embedded Systems (FFRI Monthly ...
ARMv8-M TrustZone: A New Security Feature for Embedded Systems (FFRI Monthly ...
 
CODE BLUE 2015 Report (FFRI Monthly Research 2015.11)
CODE BLUE 2015 Report (FFRI Monthly Research 2015.11)CODE BLUE 2015 Report (FFRI Monthly Research 2015.11)
CODE BLUE 2015 Report (FFRI Monthly Research 2015.11)
 
Latest Security Reports of Automobile and Vulnerability Assessment by CVSS v3...
Latest Security Reports of Automobile and Vulnerability Assessment by CVSS v3...Latest Security Reports of Automobile and Vulnerability Assessment by CVSS v3...
Latest Security Reports of Automobile and Vulnerability Assessment by CVSS v3...
 
Black Hat USA 2015 Survey Report (FFRI Monthly Research 201508)
Black Hat USA 2015 Survey Report (FFRI Monthly Research 201508)Black Hat USA 2015 Survey Report (FFRI Monthly Research 201508)
Black Hat USA 2015 Survey Report (FFRI Monthly Research 201508)
 
A Survey of Threats in OS X and iOS(FFRI Monthly Research 201507)
A Survey of Threats in OS X and iOS(FFRI Monthly Research 201507)A Survey of Threats in OS X and iOS(FFRI Monthly Research 201507)
A Survey of Threats in OS X and iOS(FFRI Monthly Research 201507)
 
Security of Windows 10 IoT Core(FFRI Monthly Research 201506)
Security of Windows 10 IoT Core(FFRI Monthly Research 201506)Security of Windows 10 IoT Core(FFRI Monthly Research 201506)
Security of Windows 10 IoT Core(FFRI Monthly Research 201506)
 
Trend of Next-Gen In-Vehicle Network Standard and Current State of Security(F...
Trend of Next-Gen In-Vehicle Network Standard and Current State of Security(F...Trend of Next-Gen In-Vehicle Network Standard and Current State of Security(F...
Trend of Next-Gen In-Vehicle Network Standard and Current State of Security(F...
 

Último

"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embeddingZilliz
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Vector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesVector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesZilliz
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 

Último (20)

"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embedding
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Vector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesVector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector Databases
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 

Mr201311 behavioral-based malware clustering (English)

  • 1. FFRI,Inc. Monthly Research Behavioral-based malware clustering Fourteenforty Research Institute, Inc. FFRI, Inc http://www.ffri.jp Ver2.00.01
  • 2. FFRI,Inc. Agenda 1. 2. 3. 4. 5. 6. 7. Background and purpose Overview of clustering An experiment The Result Considerations Conclusions Future Works 2
  • 3. FFRI,Inc. 1.Background and purpose • In recent year the number of malware has been extremely increased • It is hardly possible to analyze all malware manually – req-1) Need to determine malware to analyze preferentially (novel unique malware, etc.) – req-2) Need to make analysis more efficiently (referring similar malware information, code diffing, etc.) • In development of malware detection engines, it is difficult to use all the collected malware for prototyping and testing – req-3) Need to group malware and select representative samples • Evaluating behavioral-based clustering as a sort of methods to solve the problem 3
  • 4. FFRI,Inc. 2.Overview of clustering • Dividing data into some clusters (groups) based on “features” – “features” must be selected manually • Mainly there 2 types of clusterings – Hierarchical clustering • Considering each data as a cluster and merging them as a tree based on similarities or distances • The result is shown as dendrogram(tree) • eg. single linkage, complete linkage, average linkage, ward, etc. – Non hierarchical clustering • Dividing data into some groups based on its similarity • Hard clustering(data belong to a cluster) and Soft clustering (data might belong to some clusters) • eg. k-means, mixture model, NMF 4
  • 5. FFRI,Inc. 2.Overview of clustering / Hierarchical clustering # An example of dendrogram (alphabets on x-axis is corresponding to each datum) unique each pair is similar 5
  • 6. FFRI,Inc. 2. Overview of clustering / Hierarchical clustering # Capable of considering a result as N clusters depending on each depth 2clusters 3clusters 6clusters 6
  • 7. FFRI,Inc. 3.An experiment • • • Applying ward’s method(hierarchical clustering) – Most non hierarchical clusterings have to be specified a number of clusters • Determining the best cluster size is also problem – Using 3-gram of API-calls(no args) with weighting by tf-idf as features Datasets – Sampling 1,000 malware randomly from our collections • Confirming the detection rate using VirusTotal based on hash values • Most of vendors detect around 80% of them Software – Extracting each malware’s API-calls using Cuckoo Sandbox 0.6 – Using Scipy(and Matplotlib) for clustering # tf-idf: http://ja.wikipedia.org/wiki/Tf-idf # Scipy: http://www.scipy.org/ 7
  • 8. FFRI,Inc. 4.The result • Mainly it was divided into 3 clusters (green, red, light blue) 8
  • 9. FFRI,Inc. 5.Considerations a. Did the clustering work well? (clustering data based on functions and behaviors) b. Is it useful to determine novel unique malware? (req-1) c. Does it boost manual malware analysis? (req-2) d. Is it helpful to sample worthful data? (req-3) 9
  • 10. FFRI,Inc. 5.Considerations / a. Did the clustering work well? • Selecting 3 pairs which are similar in the deepest level of clustering • Comparing both malware’s functions and behaviors for each pairs – P-1(MD5 and detection name) • aac95e967b1ce621bd2b1a5854d0294d (HEUR:Trojan.Win32.Generic) • 69fcc9c0dca876307d97a64683936bad (Unknown) – P-2 • 5dfca9602289f20f13902c4ed3710fb2 (HEUR:Trojan.Win32.Generic) • 90c4af98638d7d9418f2e29f55ec6c9f (HEUR:Trojan.Win32.Generic) – P-3 • 9f267ae8fb419f2071795803216a3455 (Trojan.Win32.Jorik.Buterat.nwr) • dadcb4ab9827f66ba5bd350d78b902cc (Backdoor.Win32.Buterat.zqy) 10
  • 11. FFRI,Inc. P-1 • Result – Both malware might be belong to the same family, or they might be generated by the same tool with different configurations • Common points – Generating a 23148 bytes data file with same MD5 under C:¥Windows¥Registration – Accessed registry keys and created mutexes are identical – Encoding method for accessing file is the same – Containing ASCII strings in PE are mostly common – Registering itself to the same 2 ASPEs(Auto-Start Extensibility Point) • Difference – A dropped executable’s MD5 hash are different – Detection statuses are much different(‘Unknown’ is mostly undetectable) 11
  • 12. FFRI,Inc. P-1 / Accessed registry keys (completely matched) "keys": [ "HKEY_LOCAL_MACHINE¥¥Software¥¥Microsoft¥¥COM3", "HKEY_LOCAL_MACHINE¥¥Software¥¥Classes", "HKEY_LOCAL_MACHINE¥¥Software¥¥Classes¥¥CLSID", "CLSID¥¥{304CE942-6E39-40D8-943A-B913C40C9CD4}", "CLSID¥¥{304CE942-6E39-40D8-943A-B913C40C9CD4}¥¥TreatAs", "¥¥CLSID¥¥{304CE942-6E39-40D8-943A-B913C40C9CD4}", "¥¥CLSID¥¥{304CE942-6E39-40D8-943A-B913C40C9CD4}¥¥InprocServer32", "¥¥CLSID¥¥{304CE942-6E39-40D8-943A-B913C40C9CD4}¥¥InprocServerX86", "¥¥CLSID¥¥{304CE942-6E39-40D8-943A-B913C40C9CD4}¥¥LocalServer32", "¥¥CLSID¥¥{304CE942-6E39-40D8-943A-B913C40C9CD4}¥¥InprocHandler32", "¥¥CLSID¥¥{304CE942-6E39-40D8-943A-B913C40C9CD4}¥¥InprocHandlerX86", "¥¥CLSID¥¥{304CE942-6E39-40D8-943A-B913C40C9CD4}¥¥LocalServer", "HKEY_CLASSES_ROOT¥¥CLSID¥¥{304CE942-6E39-40D8-943A-B913C40C9CD4}", "HKEY_CLASSES_ROOT¥¥CLSID¥¥{304CE942-6E39-40D8-943AB913C40C9CD4}¥¥TreatAs", "HKEY_LOCAL_MACHINE¥¥Software¥¥Microsoft¥¥Rpc¥¥SecurityService", "HKEY_LOCAL_MACHINE¥¥SYSTEM¥¥CurrentControlSet¥¥Services¥¥SharedAccess¥¥Parameters¥¥ FirewallPolicy¥¥StandardProfile", "HKEY_LOCAL_MACHINE¥¥software¥¥microsoft¥¥windows nt¥¥currentversion¥¥winlogon", "HKEY_CURRENT_USER¥¥software¥¥microsoft¥¥windows¥¥currentversion¥¥run" ], 12
  • 13. FFRI,Inc. P-2 • Result – Both malware might be belong to the same family, or they might be generated by the same tool with different configurations • Common points – The number of dropped files and MD5 and size for 4 out of the 6 files – Accessed registry keys and files and created mutexes are identical – Confirming registry settings for audio related keys such as aux, mixer – Changing error reporting settings on Windows • Difference – 2 out of the 6 files are different 13
  • 14. FFRI,Inc. P-2 / Accessed registry keys (completely matched) "keys": [ "HKEY_LOCAL_MACHINE¥¥Software¥¥Microsoft¥¥Windows NT¥¥CurrentVersion¥¥IMM", "HKEY_CURRENT_USER¥¥SOFTWARE¥¥Microsoft¥¥CTF", "HKEY_LOCAL_MACHINE¥¥Software¥¥Microsoft¥¥CTF¥¥SystemShared", ... "Drivers¥¥wave", "Drivers¥¥wave¥¥wdmaud.drv", "Drivers¥¥midi", "Drivers¥¥midi¥¥wdmaud.drv", "Drivers¥¥aux", "Drivers¥¥aux¥¥wdmaud.drv", "Drivers¥¥mixer", "Drivers¥¥mixer¥¥wdmaud.drv", ... "HKEY_LOCAL_MACHINE¥¥Software¥¥Policies¥¥Microsoft¥¥PCHealth¥¥ErrorReporting", "HKEY_LOCAL_MACHINE¥¥Software¥¥Microsoft¥¥PCHealth¥¥ErrorReporting", "HKEY_LOCAL_MACHINE¥¥Software¥¥Microsoft¥¥PCHealth¥¥ErrorReporting¥¥ExclusionList", "HKEY_LOCAL_MACHINE¥¥Software¥¥Microsoft¥¥PCHealth¥¥ErrorReporting¥¥InclusionList", "HKEY_LOCAL_MACHINE¥¥System¥¥Setup" ], 14
  • 15. FFRI,Inc. P-3 • Result – Both malware might be belong to the same family, or they might be generated by the same tool with different configurations. – Same attacker might generate both malware in different period because of appearance of a common C&C FQDN • Common points – The number of dropped files and MD5 and size for 4 out of the 6 files – Accessed registry keys and files and created mutexes are identical – Changing the same IE and explorer settings – C&C FQDN is the same (sharing one identical C&C FQDN where each malware has 3 C&C FQDN) – Process tree in execution is the same • Difference – 2 C&C FQDNs out of the 3 are different 15
  • 16. FFRI,Inc. P-3 / Process tree { "pid": 404, "name": "9F267AE8FB419F2071795803216A3455.bin", "children": [ { "pid": 388, "name": "9F267AE8FB419F2071795803216A3455.bin", "children": [ { "pid": 1832, "name": "taskhost.exe", "children": [ { "pid": 1828, "name": "taskhost.exe", "children": [] } ] } ] } ] } 16
  • 17. FFRI,Inc. 5.Considerations / • Is it useful to determine novel unique malware? Following malware is likely to novel unique ones if we assume that clustering works well based on the result above – Undetectable by current anti-virus software – As a result of clustering, it is represented by unique or sparse tree If this malware is undetectable, It is possibly new malware 17
  • 18. FFRI,Inc. 5.Considerations / Does it boost manual malware analysis? • If unknown malware are making up a group in a cluster, their functions and behaviors also should be similar (It would be helpful to analyze them) • Malware detected by heuristic engines are also able to be classified more accurately – We confirmed the same "HEUR"-prefixed malware is classified to another family 18
  • 19. FFRI,Inc. 5.Considerations / Is it helpful to sample worthful data? • We can consider dividing data into arbitrary sized clusters and sampling data from each clusters • Especially if trend of each clusters are different, it is useful – Stratified sampling • http://en.wikipedia.org/wiki/Stratified_sampling 19
  • 20. FFRI,Inc. 6.Conclusions • Need to consider schemes to use malware as assets since increasing of malware • Therefore, we evaluated clustering with ward’s method • In limited evaluation, we confirmed it works well • We – – – can solve the requests using this result Determining malware to analyze preferentially Making analysis more efficiently Valuable malware sampling 20
  • 21. FFRI,Inc. 7.Future works • Comparing other features and methods • Considering methods to compare malware behaviors and functions – MAEC(Malware Attribute Enumeration and Characterization) might be useful – http://maec.mitre.org/ • More user-friendly UI/IF for a result of clustering • Considering automation and systematization 21
  • 22. FFRI,Inc. Contact Information • E-Mail: research-feedback@ffri.jp • twitter: @FFRI_Research 22