Software packer has been used effectively to hide the original code inside a binary executable, making it more difficult for existing signature based anti malware software to detect malicious code inside the executable. A new method of written and rewritten memory section is introduced to to detect the exact end time of unpacking routine and extract original code from packed binary executable using Memory Analysis running in an software emulated environment. Our experiment results show that at least 97% of the original code from the various binary executable packed with different software packers could be extracted. The proposed method has also been successfully extracted hidden code from recent malware family samples.
|Journal of Physics: Conference Series
|Published - 27 Mar 2017
|1st International Conference on Computing and Applied Informatics, ICCAI 2016 - Medan, Indonesia
Duration: 14 Dec 2016 → 15 Dec 2016