Providing Free and Editor Tested Software Downloads
< HOME | TUTORIALS | GEEK-CADE| WEB TOOLS | YOUTUBE | NEWSLETTER | DEALS! | FORUMS | >

MajorGeeks.com - May the nForce be with you.

Software Categories

All In One Tweaks
Android
Antivirus & Malware
Appearance
Back Up
Browsers
CD\DVD\Blu-Ray
Covert Ops
Drivers
Drives (SSD, HDD, USB)
Games
Graphics & Photos
Internet Tools
Linux Distros
MajorGeeks Windows Tweaks
Multimedia
Networking
Office & Productivity
System Tools

Other news

· How To and Tutorials
· Life Hacks and Reviews
· Way Off Base
· MajorGeeks Deals
· News
· Off Base
· Reviews


Opera One
Everything
you need.
Already
there.
AI assistant
Aria, built right in
Free VPN
No account needed
Ad blocker
Faster, cleaner web
Tab Islands
Grouped browsing
Useful sidebars
Make it yours
No Clunky Extensions Needed.



MajorGeeks Approved.



Download free

spread the word

· YouTube
· Facebook
· Instagram
· Twitter
· Pintrest
· RSS/XML Feeds
· News Blur
· Yahoo
· Symbaloo

about

· Top Freeware Picks
· Malware Removal
· Geektionary
· Useful Links
· About Us
· Copyright
· Privacy
· Terms of Service
· How to Uninstall

top downloads

1. GS Auto Clicker
2. Smart Defrag
3. Macrium Reflect FREE Edition
4. K-Lite Mega Codec Pack
5. MusicBee
6. Microsoft Visual C++ 2015-2022 Redistributable Package
7. Sergei Strelec's WinPE
8. Visual C++ Redistributable Runtimes AIO Repack
9. K-Lite Codec Pack Full
10. McAfee Removal Tool (MCPR)
More >>

top reads

Star How To Set a Metered Connection for a Wi-Fi Network in Windows 11

Star How To View All Installed Programs and Apps in Windows 11

Star How To Find a Drive's File System Type

Star How Much Storage Space Are Your Installed Apps Using in Windows 11?

Star How To Reset and Fix the Settings App in Windows 11

Star How To Remove the Windows 11 Updated Start Menu

Star How To Download a Windows 11 ISO

Star How To Disable Drag Tray

Star How To Boot Into WinRE (Windows Recovery Environment)

Star How To Find the Installation Date of Apps


MajorGeeks.Com » News » December 2012 » Upclicker Trojan Evades Sandbox Detection by Hiding in a Mouse Click

Upclicker Trojan Evades Sandbox Detection by Hiding in a Mouse Click


Contributed by: Email on 12/15/2012 11:53 AM [ comments Comments ]


Finding keen new ways to avoid detection by security systems, malware scanners in particular, seems to be a primary objective for malware writers.

Researchers at FireEye have found one of the most ingenious, a Trojan called Upclicker that eludes automated sandbox detection by hooking into a mouse click.

Upclicker is a backdoor that only comes to life after a user clicks and releases the left mouse button, FireEye researchers Abhishek Singh and Yasir Khalid wrote.


“Since, in sandboxes, there is no mouse interaction, the malicious behavior of Upclicker remains dormant in a sandbox environment,” they said.

Sandboxes are isolated environments where suspicious code is executed out of harm’s way. If it’s malicious, the code is blocked, otherwise, the process proceeds. Antimalware software is deploying sandboxing technology more and more as part of their core offerings. Some largely deployed applications such as Adobe Reader and Flash, as well as Java, also have sandbox capabilities.

“To evade automated analysis, we expect to see more such samples that can use a specific aspect like pressing specific keys, specific mouse buttons, or movement of the mouse a certain distance to evade the automated analysis,” the researchers said.

More malware is appearing with built-in evasion techniques. Encryption packers are longstanding tactic used by attackers to increase the viability of malicious code. Conficker, for example, was able to detect if it was opened in a virtual machine, which would indicate it was opened in a test and not a production environment, and would not execute.

Of late, financial malware known as Shylock was discovered to have the ability to detect whether it was being executed on a computer over remote desktop protocol. Researchers use RDP often to study malware samples stored in remote locations; Shylock would not install if it detects an RDP connection.

Symantec conducted some research into the lengths malware would take to avoid detection, and did some similar work on malware using the mouse to hide.

“If malware stops itself when it detects that it is running in a virtual environment, it may trick an automated threat analysis system into thinking that it is a clean program. It is also able to stop itself if it discovers a certain process name and detects that someone is monitoring it,” said Symantec’s Hiroshi Shinotsuka. “So malware may not only fool automated threat analysis systems, but also a corporate system administrator who is searching for computers compromised by malware.”

The malware writer is depending on the fact that an automated detection system doesn’t use mouse clicks. If it only executes when the mouse is clicked or moved, a normal user movement on Windows system for example, it would remain quiet all other times and a detection system could miss it.

With Upclicker, once it executes, it injects code in Windows Explorer and eventually establishes a backdoor channel where further commands await.






« Carberp Banking Trojan Goes Commercial; Adds Bootkit and $40K Price Tag · Upclicker Trojan Evades Sandbox Detection by Hiding in a Mouse Click · Video: Truck covered in Christmas lights for charity pulled over, fined by police »




Comments
comments powered by Disqus

MajorGeeks.Com » News » December 2012 » Upclicker Trojan Evades Sandbox Detection by Hiding in a Mouse Click

© 2000-2026 MajorGeeks.com
Powered by Contentteller® Business Edition