Exploiting visual appearance to cluster and detect rogue software

  • Authors:
  • Christian J. Dietrich;Christian Rossow;Norbert Pohlmann

  • Affiliations:
  • University of Applied Sciences Gelsenkirchen, Germany and University of Erlangen, Germany;University of Applied Sciences Gelsenkirchen, Germany and VU University Amsterdam, The Netherlands;University of Applied Sciences Gelsenkirchen, Germany

  • Venue:
  • Proceedings of the 28th Annual ACM Symposium on Applied Computing
  • Year:
  • 2013

Quantified Score

Hi-index 0.00

Visualization

Abstract

Rogue software, such as Fake A/V and ransomware, trick users into paying without giving return. We show that using a perceptual hash function and hierarchical clustering, more than 213,671 screenshots of executed malware samples can be grouped into subsets of structurally similar images, reflecting image clusters of one malware family or campaign. Based on the clustering results, we show that ransomware campaigns favor prepay payment methods such as ukash, paysafecard and moneypak, while Fake A/V campaigns use credit cards for payment. Furthermore, especially given the low A/V detection rates of current rogue software -- sometimes even as low as 11% -- our screenshot analysis approach could serve as a complementary last line of defense.