GroDDViewer: Dynamic dual view of Android malware Jean-Franois - - PowerPoint PPT Presentation

groddviewer dynamic dual view of android malware
SMART_READER_LITE
LIVE PREVIEW

GroDDViewer: Dynamic dual view of Android malware Jean-Franois - - PowerPoint PPT Presentation

Introduction Malware analysis Visualization Conclusion GroDDViewer: Dynamic dual view of Android malware Jean-Franois Lalande Mathieu Simon Valrie Viet Triem Tong GraMSec 2020 CIDRE team June 22th 2020 Introduction Malware analysis


slide-1
SLIDE 1

Introduction Malware analysis Visualization Conclusion

GroDDViewer: Dynamic dual view of Android malware

Jean-François Lalande Mathieu Simon Valérie Viet Triem Tong

GraMSec 2020

CIDRE team

June 22th 2020

slide-2
SLIDE 2

2 / 16

Introduction Malware analysis Visualization Conclusion

Introduction

slide-3
SLIDE 3

3 / 16

Introduction Malware analysis Visualization Conclusion

Android malware analysis

Android malware analysis static analysis: (byte)code parsing + Control Flow Graph analysis dynamic analysis: execution (smartphone, cuckoo sandbox)

slide-4
SLIDE 4

3 / 16

Introduction Malware analysis Visualization Conclusion

Android malware analysis

Android malware analysis static analysis: (byte)code parsing + Control Flow Graph analysis dynamic analysis: execution (smartphone, cuckoo sandbox) Reverse engineering: go deep into the bytecode

  • bserve what happens when executed

By Con-struct + replicant community [CC BY-SA 3.0]

slide-5
SLIDE 5

4 / 16

Introduction Malware analysis Visualization Conclusion

Tools for helping the reverser

Dynamic analysis tools for Android apps: focus on the quality of outputs do not focus on visualizing We believe that a good vizualisation tool should:

1

represents what happens at OS level

2

represents what is inside the bytecode

3

help the investigator to understand a malware

slide-6
SLIDE 6

5 / 16

Introduction Malware analysis Visualization Conclusion

Malware analysis

slide-7
SLIDE 7

6 / 16

Introduction Malware analysis Visualization Conclusion

Examples

Remote Admin Tools: Badnews: Obeys to a remote server + delays attack DroidKungFu1 (well known): Delays attack Mazar: RAT + Spyware Blocker / Eraser: WipeLocker: Wipes of the SD card

slide-8
SLIDE 8

7 / 16

Introduction Malware analysis Visualization Conclusion

Ransomware

SimpleLocker: Encrypts user’s files and asks for paying

slide-9
SLIDE 9

7 / 16

Introduction Malware analysis Visualization Conclusion

Ransomware

SimpleLocker: Encrypts user’s files and asks for paying ⇒ We would like to see: the encrypted files the part of the bytecode involved

slide-10
SLIDE 10

8 / 16

Introduction Malware analysis Visualization Conclusion

Visualization needs

Observe what happens in the system (files, sockets) Identify the involved parts of the code Observe malware over time

slide-11
SLIDE 11

8 / 16

Introduction Malware analysis Visualization Conclusion

Visualization needs

Observe what happens in the system (files, sockets) Identify the involved parts of the code Observe malware over time ⇒ We created GroDDViewer for answering these problems ! Grodd: the intelligent monkey of Marvel’s comics D: Dynamic (replay an experiment) D: Dual view (OS + Code)

slide-12
SLIDE 12

9 / 16

Introduction Malware analysis Visualization Conclusion

Our analysis framework: GroddDroid

APK

slide-13
SLIDE 13

9 / 16

Introduction Malware analysis Visualization Conclusion

Our analysis framework: GroddDroid

APK Static Analysis CFG Payload Location API usage, etc.

slide-14
SLIDE 14

9 / 16

Introduction Malware analysis Visualization Conclusion

Our analysis framework: GroddDroid

APK Static Analysis CFG Payload Location API usage, etc. Control Flow Tracer Targeting One Payload

slide-15
SLIDE 15

9 / 16

Introduction Malware analysis Visualization Conclusion

Our analysis framework: GroddDroid

APK Static Analysis CFG Payload Location API usage, etc. Control Flow Tracer Targeting One Payload Real smartphone GroddDroid Runner Reference Execution BLARE Log Collector controls New APK

slide-16
SLIDE 16

9 / 16

Introduction Malware analysis Visualization Conclusion

Our analysis framework: GroddDroid

APK Static Analysis CFG Payload Location API usage, etc. Control Flow Tracer Targeting One Payload Real smartphone GroddDroid Runner Reference Execution BLARE Log Collector controls New APK Malicious Code Trigering Coverage Code Coverage

slide-17
SLIDE 17

9 / 16

Introduction Malware analysis Visualization Conclusion

Our analysis framework: GroddDroid

APK Static Analysis CFG Payload Location API usage, etc. Control Flow Tracer Targeting One Payload Real smartphone GroddDroid Runner Reference Execution BLARE Log Collector controls New APK Malicious Code Trigering Coverage Code Coverage Visualization

slide-18
SLIDE 18

10 / 16

Introduction Malware analysis Visualization Conclusion

Blare monitoring: principle

1

Marks files with a mark

2

Observes propagation of flows

cp cat xx

File 1 File 2 File 3

slide-19
SLIDE 19

10 / 16

Introduction Malware analysis Visualization Conclusion

Blare monitoring: principle

1

Marks files with a mark

2

Observes propagation of flows

cp cat xx

File 1 File 2 File 3

slide-20
SLIDE 20

10 / 16

Introduction Malware analysis Visualization Conclusion

Blare monitoring: principle

1

Marks files with a mark

2

Observes propagation of flows

cp cat xx

File 1 File 2 File 3

slide-21
SLIDE 21

10 / 16

Introduction Malware analysis Visualization Conclusion

Blare monitoring: principle

1

Marks files with a mark

2

Observes propagation of flows

cp cat xx

File 1 File 2 File 3

slide-22
SLIDE 22

10 / 16

Introduction Malware analysis Visualization Conclusion

Blare monitoring: principle

1

Marks files with a mark

2

Observes propagation of flows

cp cat xx

File 1 File 2 File 3

slide-23
SLIDE 23

11 / 16

Introduction Malware analysis Visualization Conclusion

Visualization

slide-24
SLIDE 24

12 / 16

Introduction Malware analysis Visualization Conclusion

GroddViewer example: simplelocker

slide-25
SLIDE 25

13 / 16

Introduction Malware analysis Visualization Conclusion

GroddViewer demo

slide-26
SLIDE 26

14 / 16

Introduction Malware analysis Visualization Conclusion

Conclusion

slide-27
SLIDE 27

15 / 16

Introduction Malware analysis Visualization Conclusion

Future works

Not solved problems for dynamic observation Native code Obfuscation Remote servers New vizualisation problems Enhance the navigation into the code Deal with the visualization of protocols

slide-28
SLIDE 28

c Inria / C. Morel Questions ?