Title :
An automatic anti-anti-VMware technique applicable for multi-stage packed malware
Author :
Li Sun;Tim Ebringer;Serdar Boztas
Author_Institution :
School of Mathematical and Geospatial Sciences, RMIT University, Australia
Abstract :
The VMware Workstation virtualisation software is widely used by antivirus researchers for malware analysis. However, a large amount of current generation malware employs various anti-VMware techniques in order to resist analysis. To make things worse, these anti-VMware techniques are applied not only in the payload itself, but also in the runtime packer that is used to disguise the malicious code. Fortunately, at the present time, there is not a wide variety of anti-VMware methods in use, so the assembly code which describes the operation is quite characteristic. The issue therefore becomes exactly at what stage of the execution should one look for such code, since the actual anti-VMware code is normally heavily obfuscated. Sometimes it may only be decrypted shortly before it is executed. This paper1 shows that judicious automated control of a debugger can successfully be used to slither around anti-VMware detections even in sophisticated packers, such as Themida.
Keywords :
"Registers","Virtual machining","Fingerprint recognition","Computer science","Software engineering","Workstations","Resists","Payloads","Runtime","Assembly"
Conference_Titel :
Malicious and Unwanted Software, 2008. MALWARE 2008. 3rd International Conference on
Print_ISBN :
978-1-4244-3288-2
DOI :
10.1109/MALWARE.2008.4690853