An Obfuscation-Neglect Android Malware Scoring System
Project description
Quark Engine
An Obfuscation-Neglect
Android Malware Scoring System
Quark-Engine is also bundled with BlackArch. :shipit: A trust-worthy, practical tool that's ready to boost up your malware reverse engineering. https://twitter.com/quarkengine
Concepts
Android malware analysis engine is not a new story. Every antivirus company has their own secrets to build it. With curiosity, we develop a malware scoring system from the perspective of Taiwan Criminal Law in an easy but solid way.
We have an order theory of criminal which explains stages of committing a crime. For example, crime of murder consists of five stages, they are determined, conspiracy, preparation, start and practice. The latter the stage the more we’re sure that the crime is practiced.
According to the above principle, we developed our order theory of android malware
. We develop five stages to see if the malicious activity is being practiced. They are 1. Permission requested. 2. Native API call. 3. Certain combination of native API. 4. Calling sequence of native API. 5. APIs that handle the same register. We not only define malicious activities and their stages but also develop weights and thresholds for calculating the threat level of a malware.
Malware evolved with new techniques to gain difficulties for reverse engineering. Obfuscation is one of the most commonly used techniques. In this talk, we present a Dalvik bytecode loader with the order theory of android malware to neglect certain cases of obfuscation.
Our Dalvik bytecode loader consists of functionalities such as 1. Finding cross reference and calling sequence of the native API. 2. Tracing the bytecode register. The combination of these functionalities (yes, the order theory) not only can neglect obfuscation but also match perfectly to the design of our malware scoring system.
Detail Report
This is a how we examine a real android malware (candy corn) with one single rule (crime).
$ quark -a sample/14d9f1a92dd984d6040cc41ed06e273e.apk \
-r rules/ \
--detail
Summary Report
Examine with rules.
quark -a sample/14d9f1a92dd984d6040cc41ed06e273e.apk \
-r rules/ \
--summary
Installation
$ git clone https://github.com/quark-engine/quark-engine.git; cd quark-engine/quark
$ pipenv install --skip-lock
$ pipenv shell
Make sure your python version is 3.7
, or you could change it from Pipfile
to what you have.
Docker
docker build . -t quark
Examples:
docker run -it quark quark -a sample/14d9f1a92dd984d6040cc41ed06e273e.apk -r rules/ --summary
docker run -v $(pwd):/tmp -it quark quark -a /tmp/ThaiCamera.apk -r rules/ --summary
docker run -v $(pwd):/tmp -it quark bash
quark -a /tmp/ThaiCamera.apk -r rules/ --summary
Usage
$ quark --help
Usage: quark [OPTIONS]
Quark is an Obfuscation-Neglect Android Malware Scoring System
Options:
-s, --summary show summary report
-d, --detail show detail report
-a, --apk FILE APK file [required]
-r, --rule DIRECTORY Rules folder need to be checked [required]
--help Show this message and exit.
Analysis Reports
Qaurk Engine will soon provide analysis reports of real malware! For your best experience of viewing the report, please use desktop web browser. We're planning to make a mobile version of report. If you really want to see the very first version of report please visit here
Also, we will soon give out our new detection rules!
Project details
Release history Release notifications | RSS feed
Download files
Download the file for your platform. If you're not sure which to choose, learn more about installing packages.
Source Distribution
Built Distribution
Hashes for quark_engine-20.8-py3-none-any.whl
Algorithm | Hash digest | |
---|---|---|
SHA256 | 416073c8391ddc0145f4620e2d9f8f617a5da79c9435839ffd253d9bdf428dda |
|
MD5 | b49f0318464223195c3595ed29940abc |
|
BLAKE2b-256 | 952df37a730db132f4367667140c99ae8a86854de637203ea180451e723b4835 |