INTRODUCING STATIC MALWARE ANALYSIS: TECHNIQUES AND TOOLS

Autor: Balziya Aldosh
Jazyk: angličtina
Rok vydání: 2023
Předmět:
DOI: 10.5281/zenodo.7801447
Popis: Current state of malware phenomenon proceeds from rapid growths of technologies and IT industries. Malware mitigation and prevention steps involve implementation of reverse engineering, static and dynamic analyses. Dynamic malware analysis is a process of debugging a virus sample and inspecting its behavioristic pattern through monitoring violations and irregularities on a host machine. Static malware analysis is a set of techniques and tools to understand the nature and behavior of malicious software without executing it on the save sandbox environment. This paper proposes an overview of signature-based detection of Trojan LOKIBOT Win32 malware on Windows Operation Systems, its process to spread infection to other hosts over the network and to address malignant data from victim machines to the target systems by maintaining espionage and stealing user credentials from monitored applications. Our focus on this research for Trojan LOKIBOT Win32 will be on vendor threat intelligence platforms and interactive sandbox environments.
References: 1. Mohurle, S. and Patil, M., 2017. A brief study of wannacry threat: Ransomware at-tack 2017. International Journal of Advanced Research in Computer Science, 8(5), pp.1938-1940. 2. Sihwail, R., Omar, K. and Ariffin, K.Z., 2018. A survey on malware analysis tech-niques: Static, dynamic, hybrid and memory analysis. Int. J. Adv. Sci. Eng. Inf. Technol, 8(4-2), pp.1662-1671. 3. Prayudi, Y. and Riadi, I., 2015. Implementation of malware analysis using static and dynamic analysis method. International Journal of Computer Applications, 117(6). 4. Khilosiya, B. and Makadiya, K., 2020. Malware Analysis and Detection Using Memory Forensic. Multidiscip. Int. Res. J. Gujarat Technol. Univ, 2(2), p.106. 5. https://www.f-secure.com/v-descs/trojan_w32_lokibot.shtml
Databáze: OpenAIRE