Skip to main navigation Skip to search Skip to main content

Mac-A-Mal: macOS malware analysis framework resistant to anti evasion techniques

Research output: Contribution to JournalArticleAcademicpeer-review

Abstract

With macOS increasing popularity, the number, and variety of macOS malware are rising as well. Yet, very few tools exist for dynamic analysis of macOS malware. In this paper, we propose a macOS malware analysis framework called Mac-A-Mal. We develop a kernel extension to monitor malware behavior and mitigate several anti-evasion techniques used in the wild. Our framework exploits the macOS features of XPC service invocation that typically escape traditional mechanisms for detection of children processes. Performance benchmarks show that our system is comparable with professional tools and able to withstand VM detection. By using Mac-A-Mal, we discovered 71 unknown adware samples (8 of them using valid distribution certificates), 2 keyloggers, and 1 previously unseen trojan involved in the APT32 OceanLotus.
Original languageEnglish
Pages (from-to)249-257
Number of pages9
JournalJournal of Computer Virology and Hacking Techniques
Volume15
Issue number4
Early online date19 Jun 2019
DOIs
Publication statusPublished - Dec 2019

Funding

The project leading to this paper has received funding from the European Union’s Horizon 2020 research and innovation programme under Grant Agreement No 675320 (NeCS: European Network for Cyber Security). This work was also partially supported by Securify B.V.

FundersFunder number
Securify B.V.
Horizon 2020 Framework Programme675320

    Fingerprint

    Dive into the research topics of 'Mac-A-Mal: macOS malware analysis framework resistant to anti evasion techniques'. Together they form a unique fingerprint.

    Cite this