Summary

  • An increasing number of malware samples are using obfuscation to thwart static analysis by antimalware sandboxes
  • Self-deleting payloads, multi-layer encryption and virtual machine-based obfuscation are observed in-the-wild
  • Static analysis allows for safer inspection of suspected malware, without directly executing the sample, by extracting configuration parameters through unpacking the observed obfuscation layers.
  • Automation of this process would allow sandbox analysis to yield crucial configuration parameters.
  • Malware samples examined use a combination of AES encryption, code virtualization and staged payload delivery to impede static analysis.
  • Analysis reveals the presence of markers in the malware code to locate encryption keys, and also a second stage of obfuscation based on the KoiVM virtual machine.
  • The final payload is executed via .NET reflection, with configuration parameters stored in encrypted resources in memory.
  • Network security solutions like Cortex XDR and XSIAM can prevent these samples from executing, to protect users and networks.

By Lee Wei Yeong

Original Article