Automated Mobile Malware Classification

zynamics GmbH
zynamics GmbHzynamics GmbH
AUTOMATED
MOBILE MALWARE
CLASSIFICATION
zynamics GmbH
Status Quo: Mobile Malware
   The deluge of mobile malware that was
    predicted has not happened yet
Status Quo: Mobile Malware
   This does not mean that mobile malware is not
    a threat

   More money moving through GSM means
    more incentive to build malware

   Result: There WERE and WILL be outbreaks
News Item
Problem: Variants
   A lot of filtering can be done using MD5
     But:   Fraudsters learned to obfuscate
   Variants are easy to create
   In the Windows world:
     20k
        MD5-different variants of the same malware
     each month
Problem: Variants
   Ways to determine whether a file is a variant of
    a known malware are needed. Preferrably:
     Fast

     Cheap

     Reliable

     Easily   adapted to future threats
Current approach
   Analysis is
     Notdone at all
     Done manually by a security expert

     Done in some ad-hoc automated fashion
Problem: Variants
   Manual approaches do not satisfy our
    requirements:
     Fast:                No
     Cheap:               No
     Reliable:            Depends on the guy
     Easily   adaptable   Depends on the guy
Program Comparison
   How would we check if a file is a variant ?
   Program comparison tools are needed
   Surprise: We have built some
     In use in the ITSec and AV world since 2004
     „Best Paper“ at SSTIC 2005

     Germany‘s biggest privately funded research
      prize 2006
       We   beat Siemens and T-Systems
Program Comparison
   Core principle: Comparison is structural
   Instructions may change a lot, the program
    structure only slightly
   Graphs are generated from the programs
   Comparison happens on these graphs
Status Quo: The Windows World
Competition
Program Comparison
   Our comparison is strong because ...
     The entire program is taken into consideration
     Recompiling does not fool us

     Stable parts are identified

     Large changes do not matter much
VxClass for Mobile Malware
   VxClass compares executables
   A library of known malware is kept
   New executables can be checked if they are
    similar to existing malware
   Easy to use, Reliable, Cheap
Case Study
   Unknown executable is received
   MD5 does not match anything
   Is it a variant of an existing piece of malware ?
Automated Mobile Malware Classification
Automated Mobile Malware Classification
Automated Mobile Malware Classification
Automated Mobile Malware Classification
Automated Mobile Malware Classification
Automated Mobile Malware Classification
Multi-User capability

   Web-based
   Log in via username/password or SSL
    certificates
   Automation: Interaction via XMLRPC
Multi-User capability

   Different users can upload samples
   Three levels of permissions:
     Public:      All users can download the sample
     Protected:   All users can see, but not download
                   the sample
     Private:     No other users can see the sample
Business Case
Basic scenario:

   Recognize new malware variants
   Limit risk of outbreak
   Low-cost
   Fast response time
Business Case
Advanced scenario (with shared samples):

   Neighborhood watch
     Who else has seen this before ?
     Where ?

     When ?

     Who should I talk to ?

   Improve communication
Pricing
Telco-Style: Base Fee + Volume
 Basic:

     200 € / month
     50 € per uploaded executable

   Medium:
     500 € / month
     10 uploads included, 30 € each afterwards

   Flat rate:
     999 € / month
     No volume fee*
Pricing
   Only available to GSMA members
   The basic and medium packages may be
    shared between business entities
Pricing
This includes

   Providing the server / service
   Backups
   Email support
Roadmap
We will watch and adapt to new threats

   Windows Mobile Executables
   Of current relevance: .pyc
   Widgets
   iPhone executables
   Android
Summary
   We provide strong methods that identify
    malware variants
   Cheap, Fast, Accurate
   Any questions ?

                    Contact us !
                info@zynamics.com
1 of 30

Recommended

Metaploit by
MetaploitMetaploit
Metaploitalexngchunkiat
221 views11 slides
Evaluating Intrusion Prevention Systems with IPS Testing by
Evaluating Intrusion Prevention Systems with IPS TestingEvaluating Intrusion Prevention Systems with IPS Testing
Evaluating Intrusion Prevention Systems with IPS Testingponealmickelson
685 views6 slides
Producing Quality Software by
Producing Quality SoftwareProducing Quality Software
Producing Quality SoftwareSimon Smith
862 views16 slides
Pharming attack by
Pharming attackPharming attack
Pharming attackAkshay Surve
2.9K views8 slides
The Intersection of Security & DevOps by
The Intersection of Security & DevOpsThe Intersection of Security & DevOps
The Intersection of Security & DevOpsAlert Logic
272 views18 slides
ShaREing is Caring by
ShaREing is CaringShaREing is Caring
ShaREing is Caringzynamics GmbH
2.6K views52 slides

More Related Content

Similar to Automated Mobile Malware Classification

It's Your Move: The Changing Game of Endpoint Security by
It's Your Move: The Changing Game of Endpoint SecurityIt's Your Move: The Changing Game of Endpoint Security
It's Your Move: The Changing Game of Endpoint SecurityLumension
485 views31 slides
Safety In Numbers - Protecting Us All From The Internet of Things by
Safety In Numbers - Protecting Us All From The Internet of ThingsSafety In Numbers - Protecting Us All From The Internet of Things
Safety In Numbers - Protecting Us All From The Internet of ThingsIan Heron
210 views16 slides
Fuzzing101: Unknown vulnerability management for Telecommunications by
Fuzzing101: Unknown vulnerability management for TelecommunicationsFuzzing101: Unknown vulnerability management for Telecommunications
Fuzzing101: Unknown vulnerability management for TelecommunicationsCodenomicon
1.2K views30 slides
Oliver Schuermann - Integrated Software in Networking - the Mystery of SDN by
Oliver Schuermann - Integrated Software in Networking - the Mystery of SDNOliver Schuermann - Integrated Software in Networking - the Mystery of SDN
Oliver Schuermann - Integrated Software in Networking - the Mystery of SDNcentralohioissa
956 views40 slides
C3 by
C3C3
C3Praveen Malisetty
524 views46 slides
SentinelOne Buyers Guide by
SentinelOne Buyers GuideSentinelOne Buyers Guide
SentinelOne Buyers GuideExclusive Networks ME
1.3K views9 slides

Similar to Automated Mobile Malware Classification(20)

It's Your Move: The Changing Game of Endpoint Security by Lumension
It's Your Move: The Changing Game of Endpoint SecurityIt's Your Move: The Changing Game of Endpoint Security
It's Your Move: The Changing Game of Endpoint Security
Lumension485 views
Safety In Numbers - Protecting Us All From The Internet of Things by Ian Heron
Safety In Numbers - Protecting Us All From The Internet of ThingsSafety In Numbers - Protecting Us All From The Internet of Things
Safety In Numbers - Protecting Us All From The Internet of Things
Ian Heron210 views
Fuzzing101: Unknown vulnerability management for Telecommunications by Codenomicon
Fuzzing101: Unknown vulnerability management for TelecommunicationsFuzzing101: Unknown vulnerability management for Telecommunications
Fuzzing101: Unknown vulnerability management for Telecommunications
Codenomicon 1.2K views
Oliver Schuermann - Integrated Software in Networking - the Mystery of SDN by centralohioissa
Oliver Schuermann - Integrated Software in Networking - the Mystery of SDNOliver Schuermann - Integrated Software in Networking - the Mystery of SDN
Oliver Schuermann - Integrated Software in Networking - the Mystery of SDN
centralohioissa956 views
Two-For-One Talk: Malware Analysis for Everyone by Paul Melson
Two-For-One Talk: Malware Analysis for EveryoneTwo-For-One Talk: Malware Analysis for Everyone
Two-For-One Talk: Malware Analysis for Everyone
Paul Melson1.9K views
Kaseya Connect 2011 - Malwarebytes - Marcin Kleczynski by Kaseya
Kaseya Connect 2011 - Malwarebytes - Marcin KleczynskiKaseya Connect 2011 - Malwarebytes - Marcin Kleczynski
Kaseya Connect 2011 - Malwarebytes - Marcin Kleczynski
Kaseya619 views
Fuzzing101 uvm-reporting-and-mitigation-2011-02-10 by Codenomicon
Fuzzing101 uvm-reporting-and-mitigation-2011-02-10Fuzzing101 uvm-reporting-and-mitigation-2011-02-10
Fuzzing101 uvm-reporting-and-mitigation-2011-02-10
Codenomicon 788 views
Comodo advanced endpoint protection by David Waugh
Comodo advanced endpoint protectionComodo advanced endpoint protection
Comodo advanced endpoint protection
David Waugh83 views
Sophos Day Belgium - What's cooking in Sophos' Network Security Group? by Sophos Benelux
Sophos Day Belgium - What's cooking in Sophos' Network Security Group?Sophos Day Belgium - What's cooking in Sophos' Network Security Group?
Sophos Day Belgium - What's cooking in Sophos' Network Security Group?
Sophos Benelux3.5K views
I haz you and pwn your maal whitepaper by Harsimran Walia
I haz you and pwn your maal whitepaperI haz you and pwn your maal whitepaper
I haz you and pwn your maal whitepaper
Harsimran Walia819 views
Webinar Security: Apps of Steel transcription by Service2Media
Webinar Security:  Apps of Steel transcriptionWebinar Security:  Apps of Steel transcription
Webinar Security: Apps of Steel transcription
Service2Media373 views
Defender Pro Folio Research Paper by Karen Alvarez
Defender Pro Folio Research PaperDefender Pro Folio Research Paper
Defender Pro Folio Research Paper
Karen Alvarez3 views
The True Cost of Anti-Virus: How to Ensure More Effective and Efficient Endp... by Lumension
The True Cost of Anti-Virus: How to Ensure More Effective and Efficient Endp...The True Cost of Anti-Virus: How to Ensure More Effective and Efficient Endp...
The True Cost of Anti-Virus: How to Ensure More Effective and Efficient Endp...
Lumension1.6K views
Next Generation Endpoint Prtection Buyers Guide by Jeremiah Grossman
Next Generation Endpoint Prtection Buyers GuideNext Generation Endpoint Prtection Buyers Guide
Next Generation Endpoint Prtection Buyers Guide
Jeremiah Grossman816 views
Using Multiple Antivirus Engine Scanning to Protect Critical Infrastructure by OPSWAT
Using Multiple Antivirus Engine Scanning to Protect Critical InfrastructureUsing Multiple Antivirus Engine Scanning to Protect Critical Infrastructure
Using Multiple Antivirus Engine Scanning to Protect Critical Infrastructure
OPSWAT2K views
Security: more important than ever - Sophos Day Belux 2014 by Sophos Benelux
Security: more important than ever - Sophos Day Belux 2014Security: more important than ever - Sophos Day Belux 2014
Security: more important than ever - Sophos Day Belux 2014
Sophos Benelux1.6K views

More from zynamics GmbH

Everybody be cool, this is a roppery! by
Everybody be cool, this is a roppery!Everybody be cool, this is a roppery!
Everybody be cool, this is a roppery!zynamics GmbH
788 views46 slides
Applications of the Reverse Engineering Language REIL by
Applications of the Reverse Engineering Language REILApplications of the Reverse Engineering Language REIL
Applications of the Reverse Engineering Language REILzynamics GmbH
500 views39 slides
VxClass for Incident Response by
VxClass for Incident ResponseVxClass for Incident Response
VxClass for Incident Responsezynamics GmbH
617 views34 slides
Malware classification by
Malware classificationMalware classification
Malware classificationzynamics GmbH
666 views28 slides
Hitb by
HitbHitb
Hitbzynamics GmbH
489 views42 slides
Eusecwest by
EusecwestEusecwest
Eusecwestzynamics GmbH
396 views58 slides

More from zynamics GmbH(9)

Everybody be cool, this is a roppery! by zynamics GmbH
Everybody be cool, this is a roppery!Everybody be cool, this is a roppery!
Everybody be cool, this is a roppery!
zynamics GmbH788 views
Applications of the Reverse Engineering Language REIL by zynamics GmbH
Applications of the Reverse Engineering Language REILApplications of the Reverse Engineering Language REIL
Applications of the Reverse Engineering Language REIL
zynamics GmbH500 views
VxClass for Incident Response by zynamics GmbH
VxClass for Incident ResponseVxClass for Incident Response
VxClass for Incident Response
zynamics GmbH617 views
Platform-independent static binary code analysis using a meta-assembly language by zynamics GmbH
Platform-independent static binary code analysis using a meta-assembly languagePlatform-independent static binary code analysis using a meta-assembly language
Platform-independent static binary code analysis using a meta-assembly language
zynamics GmbH613 views
Automated static deobfuscation in the context of Reverse Engineering by zynamics GmbH
Automated static deobfuscation in the context of Reverse EngineeringAutomated static deobfuscation in the context of Reverse Engineering
Automated static deobfuscation in the context of Reverse Engineering
zynamics GmbH409 views

Recently uploaded

SAP Automation Using Bar Code and FIORI.pdf by
SAP Automation Using Bar Code and FIORI.pdfSAP Automation Using Bar Code and FIORI.pdf
SAP Automation Using Bar Code and FIORI.pdfVirendra Rai, PMP
25 views38 slides
Kyo - Functional Scala 2023.pdf by
Kyo - Functional Scala 2023.pdfKyo - Functional Scala 2023.pdf
Kyo - Functional Scala 2023.pdfFlavio W. Brasil
418 views92 slides
GDG Cloud Southlake 28 Brad Taylor and Shawn Augenstein Old Problems in the N... by
GDG Cloud Southlake 28 Brad Taylor and Shawn Augenstein Old Problems in the N...GDG Cloud Southlake 28 Brad Taylor and Shawn Augenstein Old Problems in the N...
GDG Cloud Southlake 28 Brad Taylor and Shawn Augenstein Old Problems in the N...James Anderson
126 views32 slides
SUPPLIER SOURCING.pptx by
SUPPLIER SOURCING.pptxSUPPLIER SOURCING.pptx
SUPPLIER SOURCING.pptxangelicacueva6
20 views1 slide
iSAQB Software Architecture Gathering 2023: How Process Orchestration Increas... by
iSAQB Software Architecture Gathering 2023: How Process Orchestration Increas...iSAQB Software Architecture Gathering 2023: How Process Orchestration Increas...
iSAQB Software Architecture Gathering 2023: How Process Orchestration Increas...Bernd Ruecker
48 views69 slides
The Forbidden VPN Secrets.pdf by
The Forbidden VPN Secrets.pdfThe Forbidden VPN Secrets.pdf
The Forbidden VPN Secrets.pdfMariam Shaba
20 views72 slides

Recently uploaded(20)

SAP Automation Using Bar Code and FIORI.pdf by Virendra Rai, PMP
SAP Automation Using Bar Code and FIORI.pdfSAP Automation Using Bar Code and FIORI.pdf
SAP Automation Using Bar Code and FIORI.pdf
GDG Cloud Southlake 28 Brad Taylor and Shawn Augenstein Old Problems in the N... by James Anderson
GDG Cloud Southlake 28 Brad Taylor and Shawn Augenstein Old Problems in the N...GDG Cloud Southlake 28 Brad Taylor and Shawn Augenstein Old Problems in the N...
GDG Cloud Southlake 28 Brad Taylor and Shawn Augenstein Old Problems in the N...
James Anderson126 views
iSAQB Software Architecture Gathering 2023: How Process Orchestration Increas... by Bernd Ruecker
iSAQB Software Architecture Gathering 2023: How Process Orchestration Increas...iSAQB Software Architecture Gathering 2023: How Process Orchestration Increas...
iSAQB Software Architecture Gathering 2023: How Process Orchestration Increas...
Bernd Ruecker48 views
The Forbidden VPN Secrets.pdf by Mariam Shaba
The Forbidden VPN Secrets.pdfThe Forbidden VPN Secrets.pdf
The Forbidden VPN Secrets.pdf
Mariam Shaba20 views
TrustArc Webinar - Managing Online Tracking Technology Vendors_ A Checklist f... by TrustArc
TrustArc Webinar - Managing Online Tracking Technology Vendors_ A Checklist f...TrustArc Webinar - Managing Online Tracking Technology Vendors_ A Checklist f...
TrustArc Webinar - Managing Online Tracking Technology Vendors_ A Checklist f...
TrustArc72 views
STPI OctaNE CoE Brochure.pdf by madhurjyapb
STPI OctaNE CoE Brochure.pdfSTPI OctaNE CoE Brochure.pdf
STPI OctaNE CoE Brochure.pdf
madhurjyapb14 views
PharoJS - Zürich Smalltalk Group Meetup November 2023 by Noury Bouraqadi
PharoJS - Zürich Smalltalk Group Meetup November 2023PharoJS - Zürich Smalltalk Group Meetup November 2023
PharoJS - Zürich Smalltalk Group Meetup November 2023
Noury Bouraqadi139 views
Special_edition_innovator_2023.pdf by WillDavies22
Special_edition_innovator_2023.pdfSpecial_edition_innovator_2023.pdf
Special_edition_innovator_2023.pdf
WillDavies2218 views
Automating a World-Class Technology Conference; Behind the Scenes of CiscoLive by Network Automation Forum
Automating a World-Class Technology Conference; Behind the Scenes of CiscoLiveAutomating a World-Class Technology Conference; Behind the Scenes of CiscoLive
Automating a World-Class Technology Conference; Behind the Scenes of CiscoLive
Igniting Next Level Productivity with AI-Infused Data Integration Workflows by Safe Software
Igniting Next Level Productivity with AI-Infused Data Integration Workflows Igniting Next Level Productivity with AI-Infused Data Integration Workflows
Igniting Next Level Productivity with AI-Infused Data Integration Workflows
Safe Software317 views
"Running students' code in isolation. The hard way", Yurii Holiuk by Fwdays
"Running students' code in isolation. The hard way", Yurii Holiuk "Running students' code in isolation. The hard way", Yurii Holiuk
"Running students' code in isolation. The hard way", Yurii Holiuk
Fwdays24 views

Automated Mobile Malware Classification

  • 2. Status Quo: Mobile Malware  The deluge of mobile malware that was predicted has not happened yet
  • 3. Status Quo: Mobile Malware  This does not mean that mobile malware is not a threat  More money moving through GSM means more incentive to build malware  Result: There WERE and WILL be outbreaks
  • 5. Problem: Variants  A lot of filtering can be done using MD5  But: Fraudsters learned to obfuscate  Variants are easy to create  In the Windows world:  20k MD5-different variants of the same malware each month
  • 6. Problem: Variants  Ways to determine whether a file is a variant of a known malware are needed. Preferrably:  Fast  Cheap  Reliable  Easily adapted to future threats
  • 7. Current approach  Analysis is  Notdone at all  Done manually by a security expert  Done in some ad-hoc automated fashion
  • 8. Problem: Variants  Manual approaches do not satisfy our requirements:  Fast: No  Cheap: No  Reliable: Depends on the guy  Easily adaptable Depends on the guy
  • 9. Program Comparison  How would we check if a file is a variant ?  Program comparison tools are needed  Surprise: We have built some  In use in the ITSec and AV world since 2004  „Best Paper“ at SSTIC 2005  Germany‘s biggest privately funded research prize 2006  We beat Siemens and T-Systems
  • 10. Program Comparison  Core principle: Comparison is structural  Instructions may change a lot, the program structure only slightly  Graphs are generated from the programs  Comparison happens on these graphs
  • 11. Status Quo: The Windows World
  • 13. Program Comparison  Our comparison is strong because ...  The entire program is taken into consideration  Recompiling does not fool us  Stable parts are identified  Large changes do not matter much
  • 14. VxClass for Mobile Malware  VxClass compares executables  A library of known malware is kept  New executables can be checked if they are similar to existing malware  Easy to use, Reliable, Cheap
  • 15. Case Study  Unknown executable is received  MD5 does not match anything  Is it a variant of an existing piece of malware ?
  • 22. Multi-User capability  Web-based  Log in via username/password or SSL certificates  Automation: Interaction via XMLRPC
  • 23. Multi-User capability  Different users can upload samples  Three levels of permissions:  Public: All users can download the sample  Protected: All users can see, but not download the sample  Private: No other users can see the sample
  • 24. Business Case Basic scenario:  Recognize new malware variants  Limit risk of outbreak  Low-cost  Fast response time
  • 25. Business Case Advanced scenario (with shared samples):  Neighborhood watch  Who else has seen this before ?  Where ?  When ?  Who should I talk to ?  Improve communication
  • 26. Pricing Telco-Style: Base Fee + Volume  Basic:  200 € / month  50 € per uploaded executable  Medium:  500 € / month  10 uploads included, 30 € each afterwards  Flat rate:  999 € / month  No volume fee*
  • 27. Pricing  Only available to GSMA members  The basic and medium packages may be shared between business entities
  • 28. Pricing This includes  Providing the server / service  Backups  Email support
  • 29. Roadmap We will watch and adapt to new threats  Windows Mobile Executables  Of current relevance: .pyc  Widgets  iPhone executables  Android
  • 30. Summary  We provide strong methods that identify malware variants  Cheap, Fast, Accurate  Any questions ? Contact us ! info@zynamics.com