Intensive Image Malware Analysis and Least Significant Bit Matching Steganalysis

10/02/2021
by   Yogesh Kulkarni, et al.
0

Malware as defined by Kaspersky Labs is a type of computer program designed to infect a legitimate user’s computer and inflict harm on it in multiple ways. The exponential growth of the internet has led to a significant escalation in malware attacks which affect the multitude often leading to disastrous consequences. One of the most minacious methods of malware unfurling is through images. In this paper we analyze the following methods of embedding malicious payloads in images: 1) Disguising PHP/ASM web shells inside Exchangeable Image File Format i.e. EXIF data of an image. 2) An injection vulnerability that conceals Cross-Site Scripting (XSS) in the EXIF data to execute malicious payloads when the image is uploaded to a browser. 3) Feigning a malicious executable file in a zipped .sfx file format as an image. 4) Splitting the attack payload into safe decoder and pixel encoded code. 5) Least Significant Bit (LSB) Matching Steganography technique used for pernicious payload embedding in image pixel data. After extensive analysis of these malware embedding techniques, we present ‘AnImAYoung’, an image malware analysis framework that thoroughly examines given images for the presence of any kind of anomalous content. Our framework utilizes ensemble methods to detect miniature statistical changes in images using machine learning, where the LSB Matching Steganography technique was used for payload embedding, which increases the accuracy of the framework. The framework achieves excellent performance by applying sophisticated computing algorithms and can be easily integrated with organizations working with Big Data providing them with a robust malware security option. This study describes the need and a practical approach to tackle this novel method of malware dissemination.

READ FULL TEXT
research
07/26/2023

Open Image Content Disarm And Reconstruction

With the advance in malware technology, attackers create new ways to hid...
research
10/06/2021

Stegomalware: A Systematic Survey of MalwareHiding and Detection in Images, Machine LearningModels and Research Challenges

Malware distribution to the victim network is commonly performed through...
research
08/12/2022

On deceiving malware classification with section injection

We investigate how to modify executable files to deceive malware classif...
research
10/10/2019

Would a File by Any Other Name Seem as Malicious?

Successful malware attacks on information technology systems can cause m...
research
09/19/2020

Optimizing Away JavaScript Obfuscation

JavaScript is a popular attack vector for releasing malicious payloads o...
research
03/25/2019

Capturing the symptoms of malicious code in electronic documents by file's entropy signal combined with Machine learning

Abstract-Email cyber-attacks based on malicious documents have become th...
research
02/19/2020

Detection and Analysis of Drive-by Downloads and Malicious Websites

A drive by download is a download that occurs without users action or kn...

Please sign up or login with your details

Forgot password? Click here to reset