New computing paradigms, modern feature-rich programming languages and off-the-shelf software libraries enabled the development of new sophisticated malware families. Evidence of this phenomena is the recent growth of fileless malware attacks. Fileless malware or memory resident malware is an example of an Advanced Volatile Threat (AVT). In a fileless malware attack, the malware writes itself directly onto the main memory (RAM) of the compromised device without leaving any trace on the compromised device's file system. For this reason, fileless malware presents a difficult challenge for traditional malware detection tools and in particular signature-based detection. Moreover, fileless malware forensics and reverse engineering are nearly impossible using traditional methods. The majority of fileless malware attacks in the wild take advantage of MS PowerShell, however, fileless malware are not limited to MS PowerShell. In this paper, we designed and implemented a fileless malware by taking advantage of new features in Javascript and HTML5. The proposed fileless malware could infect any device that supports Javascript and HTML5. It serves as a proof-of-concept (PoC) to demonstrate the threats of fileless malware in web applications. We used the proposed fileless malware to evaluate existing methods and techniques for malware detection in web applications. We tested the proposed fileless malware with several free and commercial malware detection tools that apply both static and dynamic analysis. The proposed fileless malware bypassed all the anti-malware detection tools included in our study. In our analysis, we discussed the limitations of existing approaches/tools and suggested possible detection and mitigation techniques.
翻译:新的计算机模式、现代功能丰富的编程语言和现成的软件库使得开发新的精密恶意软件家庭成为了困难的挑战。这种现象的证据是最近无档案的恶意攻击的增加。无档案的恶意软件或记忆的常住恶意软件是高级挥发式威胁(AVT)的一个例子。在无档案的恶意软件攻击中,恶意软件直接写在受损装置的主记忆(RAM)上,而没有在已失密装置的档案系统中留下任何痕迹。为此,无档案的恶意软件对传统的恶意软件检测工具,特别是基于签名的检测工具提出了难题。此外,无档案的恶意软件法和反向工程几乎不可能使用传统方法。在野外发生的大多数无档案的恶意软件攻击利用了MS PowerShell(AVL) 。在本文中,我们设计并应用了一种无档案的恶意软件,我们用这些工具来测试了现有的无档案记录和无档案工具,我们用这些工具来测试了无动态的检测工具。我们用了一些无档案工具来证明(PoC),我们用不动式的检测工具来测试了目前不动的不动的磁软件。