packing-box / docker-packing-box

Docker image gathering packers and tools for making datasets of packed executables and training machine learning models for packing detection
GNU General Public License v3.0
44 stars 10 forks source link

Update common malicious apis #125

Closed AlexVanMechelen closed 4 months ago

AlexVanMechelen commented 4 months ago

This PR adds:

dhondta commented 4 months ago

@AlexVanMechelen You can use comments (with #) to specify the source where you found your entries. We can for instance integrate those of this source.

AlexVanMechelen commented 4 months ago

@dhondta The current ones in this PR follow from own analysis on dataset-packed-pe (see Appendix B). I'll add the ones from the source you included here above, as they likely follow from a larger scale analysis & to avoid overfitting to our dataset.

AlexVanMechelen commented 4 months ago

@dhondta On the other hand, the api's from the source you included are common in malware. Packers will typically try to hide those malicious api calls by dynamically loading them or other obfuscation techniques. The functions from our analysis (Appendix B) might be more tailored to packers. I might include both groups

AlexVanMechelen commented 4 months ago

@dhondta List updated.

TODO

Do you have suggestions for better ways of implementing those?

dhondta commented 4 months ago

@AlexVanMechelen There are two ways:

I will solve your issue of suffixes with a simple script for which I will keep the code in a Wiki page not to "pollute" the data folder.