Frankenstein: stitching malware from benign binaries

  • Authors:
  • Vishwath Mohan;Kevin W. Hamlen

  • Affiliations:
  • School of Electrical and Computer Science, University of Texas at Dallas;School of Electrical and Computer Science, University of Texas at Dallas

  • Venue:
  • WOOT'12 Proceedings of the 6th USENIX conference on Offensive Technologies
  • Year:
  • 2012

Quantified Score

Hi-index 0.00

Visualization

Abstract

This paper proposes a new self-camouflaging malware propagation system, Frankenstein, that overcomes shortcomings in the current generation of metamorphic malware. Specifically, although mutants produced by current state-of-the-art metamorphic engines are diverse, they still contain many characteristic binary features that reliably distinguish them from benign software. Frankenstein forgoes the concept of a metamorphic engine and instead creates mutants by stitching together instructions from non-malicious programs that have been classified as benign by local defenses. This makes it more difficult for feature-based malware detectors to reliably use those byte sequences as a signature to detect the malware. The instruction sequence harvesting process leverages recent advances in gadget discovery for return-oriented programming. Preliminary tests show that mining just a few local programs is sufficient to provide enough gadgets to implement arbitrary functionality.