Skip to main content
Log in

A study on common malware families evolution in 2012

  • Invited Paper
  • Published:
Journal of Computer Virology and Hacking Techniques Aims and scope Submit manuscript

Abstract

With the exponential growth of malware in the last 5 years, the number of polymorphic malware increased as well. The aim of this paper is to describe the evolution throughout a year of four major malware families (FakeAlert, Sirefef, ZBot and Vundo). The analysis has been made in terms of polymorphic mechanisms with regards to the polymorphic mechanisms (such as changes in the packer module, changes in the geometry of file, variation of version information from the resource directory or different methods used to modify the icon of one file) which have been used in order to avoid their detection by anti-malware systems. The malware files were collected every week throughout one year’s time. For each family we have recorded the new variants and the updates that were added to the old ones in order to avoid detection. We have managed to examine more than 1,000 new versions of such files. The current article includes an additional study case. The latter focuses on the methods that have been used by the FakeAlert malware family in order to modify their icons.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9

Similar content being viewed by others

References

  1. http://www.av-test.org/en/statistics/malware/

  2. https://zeustracker.abuse.ch/statistic.php

  3. http://www.microsoft.com/security/portal/

  4. Gupta, A., Kuppili, P., Akella, A., Barford, P.: An empirical study of malware evolution. In Communication Systems and Networks and Workshops, 2009. COMSNETS 2009. First, International, pp. 1–10, jan. (2009)

  5. Iliopoulos, D., Adami, C., Szor, P.: Darwin inside the machines: Malware evolution and the consequencs for computer security. CoRR, abs/1111.2503, 2011

  6. Tonimir, K., Klasic, D., Hutinski, Z.: A multiple layered approach to malware identification and classification problem. In Procceding of the 21st Central European Conference on Information and Intelligent Systems, jul, 2010, pp. 429–433, (2010)

  7. Krause, E.: Taxicab Geometry: an adventure in non-Euclidean geometry. Dover Publications, New York, pp. 1–5 (1987)

  8. McAfee Labs. 2012 threat predictions. Technical report. http://www.mcafee.com/us/resources/reports/rp-threat-predictions-2012.pdf

  9. Microsoft: The evolution of malware and the threat landscape—a 10-year review. Technical report (2012)

  10. Moore, D., Paxson, V., Savage, S., Shannon, C., Staniford-Chen, S., Weaver, N.: Inside the slammer worm. IEEE Secur Priv 1(4), 33–39 (2003)

    Article  Google Scholar 

  11. Juniper Networks: The evolving threat landscape. Technical report. http://www.juniper.net/us/en/local/pdf/whitepapers/2000371-en.pdf (2012)

  12. Srikanth, R.: Mobile malware evolution, detection and defense. pp. 3–13 (2012)

  13. Yan, G., Chen, G., Eidenbenz, S., Li, N.: Malware propagation in online social networks: nature, dynamics, and defense implications. In Cheung, B., S., N, Hui, L., C., K., Sandhu, R., S. and Wong, DS., eds, ASIACCS, ACM, pp. 196–206 (2011)

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Marius Barat.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Barat, M., Prelipcean, DB. & Gavriluţ, D.T. A study on common malware families evolution in 2012. J Comput Virol Hack Tech 9, 171–178 (2013). https://doi.org/10.1007/s11416-013-0192-5

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11416-013-0192-5

Keywords

Navigation