ClamWin Free Antivirus Forum Index
ClamWin Free Antivirus
Support and Discussion Forums
Reply to topic
PE Headers
GuitarBob


Joined: 09 Jul 2006
Posts: 9
Location: USA
Reply with quote
Some months ago, Sherpya and bOne did some work on PE headers. I was wondering if anything ever came of this--did they come up with anything that could be used in ClamWin to enhance malware identification using PE file headers?

Regards,
View user's profileSend private message
Re: PE Headers
b0ne


Joined: 26 Oct 2006
Posts: 0
Reply with quote
GuitarBob wrote:
Some months ago, Sherpya and bOne did some work on PE headers. I was wondering if anything ever came of this--did they come up with anything that could be used in ClamWin to enhance malware identification using PE file headers?


It was to enable self-decrypted processes to be dumped from memory to disk, then scanned by clamscan. It's in there, unfortunately, most signatures created by the clamav team do not target unpacked data since clamav has limited unpacking capabilities.
View user's profileSend private message
GuitarBob


Joined: 09 Jul 2006
Posts: 9
Location: USA
Reply with quote
Thanks for the info. Clam adds a new unpacker every once in a while. Have you contacted them to see if they are interested in enabling this functionality? They might at least keep it on the back burner.

Regards,
View user's profileSend private message
b0ne


Joined: 26 Oct 2006
Posts: 0
Reply with quote
GuitarBob wrote:
Thanks for the info. Clam adds a new unpacker every once in a while. Have you contacted them to see if they are interested in enabling this functionality? They might at least keep it on the back burner.


Unfortunately, it is platform dependent functionality. It is designed to target malware that has already "run" on the Windows platform and has unpacked itself with no 3rd party intervention.

In order to scan that with the clamav engine, all that is basically needed is to dump that process snapshot out of memory to a temp file on disk and toss it at clamscan.
View user's profileSend private message
GuitarBob


Joined: 09 Jul 2006
Posts: 9
Location: USA
Reply with quote
b0ne wrote:
Unfortunately, it is platform dependent functionality. It is designed to target malware that has already "run" on the Windows platform and has unpacked itself with no 3rd party intervention.

In order to scan that with the clamav engine, all that is basically needed is to dump that process snapshot out of memory to a temp file on disk and toss it at clamscan.


It seems like some good functionality that should be considered, but I guess Clam isn't concerned with Windows per se. By "already run" do you mean that if this functionality could be implemented, the associated malware will have already done its thing or just unpacked itself? If it has done its thing, what would it take to insert a Windows hook to prevent it from running if it is malware? Finally, is there any way to toss it at Clamscan from ClamWin?

Regards,
View user's profileSend private message
b0ne


Joined: 26 Oct 2006
Posts: 0
Reply with quote
GuitarBob wrote:

By "already run" do you mean that if this functionality could be implemented, the associated malware will have already done its thing or just unpacked itself? If it has done its thing, what would it take to insert a Windows hook to prevent it from running if it is malware? Finally, is there any way to toss it at Clamscan from ClamWin?


I mean that the malware is already alive on the system and currently still has a process loaded in memory. Allowing it to decrypt itself while not performing malicious things on the live OS is a near impossible thing to do in a generic fashion without an emulator and a "fake" windows environment inside of that emulator.
View user's profileSend private message
GuitarBob


Joined: 09 Jul 2006
Posts: 9
Location: USA
Reply with quote
I see. Some security people have been talking about virtual sandboxes lately. Would that be feasable?

Regards,
View user's profileSend private message
b0ne


Joined: 26 Oct 2006
Posts: 0
Reply with quote
GuitarBob wrote:
I see. Some security people have been talking about virtual sandboxes lately. Would that be feasable?


Essentially the same thing. It takes a massive amount of effort and time to create such things.
View user's profileSend private message
PE Headers
You cannot post new topics in this forum
You cannot reply to topics in this forum
You cannot edit your posts in this forum
You cannot delete your posts in this forum
You cannot vote in polls in this forum
All times are GMT  
Page 1 of 1  

  
  
 Reply to topic