发明名称 Malware analysis methods and systems
摘要 Methods of analyzing malware and other suspicious files are presented, where some embodiments include analyzing the behavior of a first malware sample on both a virtual machine and a physical computing device, the physical device having been booted from a secondary boot source, and determining whether the behavior of the malware sample was different on the virtual machine and the physical computing device. In certain embodiments, a notification indicating that the behavior was different may be generated. In other embodiments, a malware analysis computing device that is configured to receive a base hard drive image may be network booted, and the behavior of the malware sample on the malware analysis computing device may be analyzed. In certain embodiments, a malware-infected hard drive image may then be copied off the malware analysis computing device.
申请公布号 US9516060(B2) 申请公布日期 2016.12.06
申请号 US201514875217 申请日期 2015.10.05
申请人 Bank of America Corporation 发明人 Yu Sounil;Schafer Christopher
分类号 H04L29/06;G06F21/56 主分类号 H04L29/06
代理机构 Banner & Witcoff, Ltd. 代理人 Banner & Witcoff, Ltd. ;Springs Michael A.
主权项 1. A method comprising: initializing, by an administrative computing device, a virtual machine; installing, by the administrative computing device, a first malware sample onto the virtual machine; analyzing, by the administrative computing device, the behavior of the first malware sample on the virtual machine to identify at least one virtual machine malware action; causing, by the administrative computing device, a physical computing device to be booted from a secondary boot source different from a primary boot source, the primary boot source being a hard disk on the physical computing device, wherein the physical computing device is a separate device from the administrative computing device, and wherein the physical computing device does not initialize a virtual machine after booting; installing, by the administrative computing device, the first malware sample onto the physical computing device; analyzing, by the administrative computing device, the behavior of the first malware sample on the physical computing device to identify at least one physical computing device malware action; determining, by the administrative computing device, based on the analyzing, whether the behavior of the first malware sample on the virtual machine was different from the behavior of the first malware sample on the physical computing device by comparing the at least one virtual machine malware action and the at least one physical computing device malware action; responsive to determining that the behavior of the first malware sample on the virtual machine was different from the behavior of the first malware sample on the physical computing device, generating, by the administrative computing device, a notification indicating the first malware sample behaved differently; restarting, by the administrative computing device, the virtual machine such that it is ready for subsequent malware analysis; causing, by the administrative computing device, the physical computing device to be rebooted using an IP-enabled power strip, wherein the physical computing device is configured to be rebooted from the secondary boot source such that it is ready for subsequent malware analysis; installing, by the administrative computing device, at least a second malware sample onto the physical computing device and the virtual machine; analyzing, by the administrative computing device, the behavior of the at least a second malware sample on the virtual machine; analyzing, by the administrative computing device, the behavior of the at least a second malware sample on the physical computing device; determining, by the administrative computing device, based on the analyzing, whether the behavior of the at least a second malware sample on the virtual machine was different from the behavior of the at least a second malware sample on the physical computing device; and responsive to determining that the behavior of the at least a second malware sample on the virtual machine was different from the behavior of the at least a second malware sample on the physical computing device, generating, by the administrative computing device, a notification indicating the at least a second malware sample behaved differently.
地址 Charlotte NC US