ESET researchers bring unique masking techniques to light, aiming to help the cybersecurity industry improve protection against sophisticated threats.
BRATISLAVA, March 19, 2020 – ESET researchers have analyzed and described in detail several techniques used by malicious actors to thwart analysis and avoid detection of their malware. These custom masking and detection evasion techniques were discovered in the course of the investigation of a new module used by the cybercriminals behind the Stantinko botnet.
“The protective techniques we encountered during our analysis are more advanced than the malware they protect. And some of them have not yet been publicly described,” said Vladislav Hrčka, the ESET malware analyst who conducted the research.
Among the protective techniques, two stand out: the obfuscation of strings and control-flow obfuscation.
Obfuscation of strings relies on meaningful strings being constructed and only present in memory when they are to be used. Control-flow obfuscation transforms the control flow to a form that is hard to read, as the execution order of basic blocks is unpredictable without extensive analysis.
“We dissect these techniques and describe possible countermeasures against some of them,” said Hrčka.
In addition to the obfuscation of strings and control-flow obfuscation, the malware authors also employed further techniques: dead code, do-nothing code, and dead strings and resources. Some of these techniques are meant to prevent detection by making the files look more legitimate, while other implementations are aimed specifically to bypass behavioral detections.
For more details about the new module in the Stantinko botnet, read the blog post “Stantinko’s new cryptominer features unique obfuscation techniques” on WeLiveSecurity.com. Make sure to follow ESET Research on Twitter for the latest news from ESET Research.
About ESET
For more than 30 years, ESET® has been developing industry-leading IT security software and services for businesses and consumers worldwide. With solutions ranging from endpoint and mobile security to encryption and two-factor authentication, ESET’s high-performing, easy-to-use products give consumers and businesses the peace of mind to enjoy the full potential of their technology. ESET unobtrusively protects and monitors 24/7, updating defenses in real time to keep users safe and businesses running without interruption. Evolving threats require an evolving IT security company. Backed by R&D centers worldwide, ESET is the first IT security company to earn 100 Virus Bulletin VB100 awards, identifying every single “in-the-wild” malware without interruption since 2003. For more information, visit www.eset.com or follow us on LinkedIn, Facebook, and Twitter.