Providing Free and Editor Tested Software Downloads
< HOME | TUTORIALS | GEEK-CADE| WEB TOOLS | YOUTUBE | NEWSLETTER | DEALS! | FORUMS | >

MajorGeeks.com - You want the Geek? You can't handle the Geek!

Software Categories

All In One Tweaks
Android
Antivirus & Malware
Appearance
Back Up
Browsers
CD\DVD\Blu-Ray
Covert Ops
Drivers
Drives (SSD, HDD, USB)
Games
Graphics & Photos
Internet Tools
Linux Distros
MajorGeeks Windows Tweaks
Multimedia
Networking
Office & Productivity
System Tools

Other news

· How To and Tutorials
· Life Hacks and Reviews
· Way Off Base
· MajorGeeks Deals
· News
· Off Base
· Reviews



IObit Black Friday Sale

spread the word

· YouTube
· Facebook
· Instagram
· Twitter
· Pintrest
· RSS/XML Feeds
· News Blur
· Yahoo
· Symbaloo

about

· Top Freeware Picks
· Malware Removal
· Geektionary
· Useful Links
· About Us
· Copyright
· Privacy
· Terms of Service
· How to Uninstall

top downloads

1. GS Auto Clicker
2. Macrium Reflect FREE Edition
3. Smart Defrag
4. MusicBee
5. Sergei Strelec's WinPE
6. Microsoft Visual C++ 2015-2022 Redistributable Package
7. Visual C++ Redistributable Runtimes AIO Repack
8. McAfee Removal Tool (MCPR)
9. K-Lite Mega Codec Pack
10. Tweaking.com - Windows Repair
More >>

top reads

Star All the New Features Landing in Windows 11 This December

Star Lossless vs Lossy: When FLAC, APE, and ALAC Beat MP3 and When They Don't

Star Google Search Tricks You'll Actually Use in 2025 and Beyond

Star Fresh PC Checklist: First 12 Things to Do On a New Windows 11 Machine

Star Running AI Models Locally: What They Are, Where to Find Them, and How to Get Started

Star Deciding Between Idle State, Sleep Mode, and Shutdown: What's Best for Your PC?

Star How to Fix VMware Workstation "The Update Server Could Not Be Resolved" Error Installing VMware Tools

Star How to Remove Google Gemini from Your Phone (and Your Life)

Star Windows Bloat Removal Guide: Debloat Safely and Keep What You Need

Star Windows 11 Repair Playbook: SFC, DISM, CHKDSK Without Breaking Stuff


MajorGeeks.Com » News » December 2012 » Upclicker Trojan Evades Sandbox Detection by Hiding in a Mouse Click

Upclicker Trojan Evades Sandbox Detection by Hiding in a Mouse Click


Contributed by: Email on 12/15/2012 04:53 PM [ comments Comments ]


Finding keen new ways to avoid detection by security systems, malware scanners in particular, seems to be a primary objective for malware writers.

Researchers at FireEye have found one of the most ingenious, a Trojan called Upclicker that eludes automated sandbox detection by hooking into a mouse click.

Upclicker is a backdoor that only comes to life after a user clicks and releases the left mouse button, FireEye researchers Abhishek Singh and Yasir Khalid wrote.


“Since, in sandboxes, there is no mouse interaction, the malicious behavior of Upclicker remains dormant in a sandbox environment,” they said.

Sandboxes are isolated environments where suspicious code is executed out of harm’s way. If it’s malicious, the code is blocked, otherwise, the process proceeds. Antimalware software is deploying sandboxing technology more and more as part of their core offerings. Some largely deployed applications such as Adobe Reader and Flash, as well as Java, also have sandbox capabilities.

“To evade automated analysis, we expect to see more such samples that can use a specific aspect like pressing specific keys, specific mouse buttons, or movement of the mouse a certain distance to evade the automated analysis,” the researchers said.

More malware is appearing with built-in evasion techniques. Encryption packers are longstanding tactic used by attackers to increase the viability of malicious code. Conficker, for example, was able to detect if it was opened in a virtual machine, which would indicate it was opened in a test and not a production environment, and would not execute.

Of late, financial malware known as Shylock was discovered to have the ability to detect whether it was being executed on a computer over remote desktop protocol. Researchers use RDP often to study malware samples stored in remote locations; Shylock would not install if it detects an RDP connection.

Symantec conducted some research into the lengths malware would take to avoid detection, and did some similar work on malware using the mouse to hide.

“If malware stops itself when it detects that it is running in a virtual environment, it may trick an automated threat analysis system into thinking that it is a clean program. It is also able to stop itself if it discovers a certain process name and detects that someone is monitoring it,” said Symantec’s Hiroshi Shinotsuka. “So malware may not only fool automated threat analysis systems, but also a corporate system administrator who is searching for computers compromised by malware.”

The malware writer is depending on the fact that an automated detection system doesn’t use mouse clicks. If it only executes when the mouse is clicked or moved, a normal user movement on Windows system for example, it would remain quiet all other times and a detection system could miss it.

With Upclicker, once it executes, it injects code in Windows Explorer and eventually establishes a backdoor channel where further commands await.






« Carberp Banking Trojan Goes Commercial; Adds Bootkit and $40K Price Tag · Upclicker Trojan Evades Sandbox Detection by Hiding in a Mouse Click · Video: Truck covered in Christmas lights for charity pulled over, fined by police »




Comments
comments powered by Disqus

MajorGeeks.Com » News » December 2012 » Upclicker Trojan Evades Sandbox Detection by Hiding in a Mouse Click

© 2000-2025 MajorGeeks.com
Powered by Contentteller® Business Edition