Mal-Xtract: Hidden Code Extraction using Memory Analysis

Charles Lim, Yohanes Syailendra Kotualubun, Suryadi, Kalamullah Ramli

Research output: Contribution to journalConference articlepeer-review

2 Citations (Scopus)

Abstract

Software packer has been used effectively to hide the original code inside a binary executable, making it more difficult for existing signature based anti malware software to detect malicious code inside the executable. A new method of written and rewritten memory section is introduced to to detect the exact end time of unpacking routine and extract original code from packed binary executable using Memory Analysis running in an software emulated environment. Our experiment results show that at least 97% of the original code from the various binary executable packed with different software packers could be extracted. The proposed method has also been successfully extracted hidden code from recent malware family samples.

Original languageEnglish
Article number012058
JournalJournal of Physics: Conference Series
Volume801
Issue number1
DOIs
Publication statusPublished - 27 Mar 2017
Event1st International Conference on Computing and Applied Informatics, ICCAI 2016 - Medan, Indonesia
Duration: 14 Dec 201615 Dec 2016

Fingerprint

Dive into the research topics of 'Mal-Xtract: Hidden Code Extraction using Memory Analysis'. Together they form a unique fingerprint.

Cite this