Malware Sandbox Evasion Techniques in Mobile Devices
Malware Sandbox Evasion Techniques in Mobile Devices
Malware Sandbox Evasion Techniques in Mobile Devices
69 This work is licensed under Creative Commons Attribution 4.0 International License.
International Journal of Engineering and Management Research e-ISSN: 2250-0758 | p-ISSN: 2394-6962
Volume-12, Issue-6, (December 2022)
www.ijemr.net https://doi.org/10.31033/ijemr.12.6.9
II. BACKGROUND AND LITRATURE which then gathers data from it and reports it to Cuckoo
SURVEY Sandbox. The description of a few of the major
components in figure 1 is provided above.
A. Sandbox C. Malware
Sandboxes are designed to test for malwares. One-third of mobile devices are at medium to
Application can run in sandboxes, which are closed high risk of data exposure, and Android smartphones are
environments, under close supervision. They enable roughly twice as likely as iOS devices to contain malware.
defenders to check both known malware and unknown In this part, we will discuss some of the most common
software for dangerous behavior in order to develop mobile malwares.
behavioral signatures for use in anti-malware systems. In Trojans
order to confine the undesirable consequences of A Trojan is a piece of software that seems to the
potentially dangerous programs, these systems might be user to be a harmless program but executes dangerous
physical devices (sometimes referred to as "bare-metal operations in the background. Trojans are employed to aid
sandboxes") with restricted network capabilities. Virtual in the assault on a system by executing actions that may
machines and other system emulators, however, offer a weaken the system's security, allowing for easy hacking.
scalable platform for building malware sandboxes because FakeNetflix is an example of a Trojan that harvests user
of the enormous quantity of program executables that have credentials for Netflix accounts in Android settings. The
been analyzed. Trojan KeyRaider was used to steal Apple IDs and
As it was already said that the Android platform passwords.
has a greater market area, the "Google Play Store," the Root exploits - back doors
major application marketplace on the Android, has almost Backdoors employ root access to hide malware
3 million applications accessible for download, and that from antivirus software. Rage against the cage (RATC) is
figure is growing every day [1]. It is hard to manually a common Android root hack that allows complete device
analyze each app in light of the enormous surge of new control. If the root exploit achieves root power, the
ones. Malware sandboxes are used to automate the malware can conduct any activity on the device, including
detection and removal of dangerous apps from the the installation of programs while the user is ignorant.
environment by application marketplaces and security Xagent is an iOS Trojan that opens a back door and grabs
companies. data from the attacked device.
B. CuckooDroid Ransomware
CuckooDroid is a feature of Cuckoo Sandbox, an Ransomware restricts users' access to their data
open-source program for automatically analyzing dynamic by locking the device or encrypting the data files until the
malware. It makes it possible for Cuckoo to run and ransom is paid. Fake Defender is malware that
examine Android applications. masquerades as Avast antivirus. For the purpose of money,
Cuckoodroid has two major components: a "host" it locks the victim's device. In 2017, hackers exploited a
and a "guest." architecture of the CuckooDroid is shown in Safari weakness used for pop-ups to create an iOS
Figure 1. malware.
Botnets
A "bot" is a sort of malware that allows an
attacker to take control of an infected mobile device. They
are part of a network of infected computers known as a
"botnet," which is generally made up of all victim mobile
devices worldwide. Geinimi is a botnet for Android.
Spyware
Spying software is what spyware is. It runs in the
background undetected while collecting data or providing
remote access to its author. Android malware such as
Nickspy and GPSSpy observes the user's sensitive
information and sends it to the owner. Passrobber is an
example of iOS Spyware since it is capable of intercepting
Figure 1: CuckooDroid Architecture outbound SSL traffic, checking for Apple IDs and
passwords, and sending these stolen credentials to a
The android emulator is managed by Cuckoo command-and-control server.
Sandbox, which also creates a report at the end of the
report. The application is executed by Android Emulator,
70 This work is licensed under Creative Commons Attribution 4.0 International License.
International Journal of Engineering and Management Research e-ISSN: 2250-0758 | p-ISSN: 2394-6962
Volume-12, Issue-6, (December 2022)
www.ijemr.net https://doi.org/10.31033/ijemr.12.6.9
F. Existing android malware analysis sandboxes ability to take into account the three key obstacles that
When it comes to sandboxes, there are a few were discussed earlier, we came to the conclusion that it
frameworks, sandboxes, and analytic systems already was the best one for us to adopt. In order for us to carry out
available for android sandboxes, as well as some that have this automated research method, we made use of the
been proposed as well. Static approach was initially resources that were provided by IEEE, Science Direct,
employed to assess Android apps. A rudimentary system Research Gate, and Medline (the version that is available
that has been developed by Schmidt et al, utilizes the through PubMed). The search was limited to articles in
"readelf" program to extract the function calls from an academic periodicals and journals that were exclusively
Android application and compares the resultant list with available in the English language between the years of
the information of identified malware [6]. Another 2010and 2022. Additionally, the works had to have been
instance of the static analysis technique is “Androguard”, a evaluated by other specialists before they were published.
totally open-source system proposed by Desnos et al. In Throughout the course of the investigation, a number of
this scenario, the system decompiles the application and distinct search terms, such as "Analyzing the system
uses signature-based malware identification [7] [8]. It was information like CPU core count, Digital system signature,
discovered that malware authors began to develop more installed programs, OS reboots and hardware
obfuscated code, which has demonstrated its efficacy components,"CuckooDroid Sandbox status research
against static analysis, indicating that static analysis alone papers," "Sandbox mobile application testing," "Android
is insufficient for those advancing malware. As a result, applications malware detection," and "Mobile applications
researchers developed a dynamic analysis mechanism for malware testing," were utilized; these terms were all
Android apps. The first solution with dynamic analysis that owned by us for the purpose of finding the research papers.
offers real-time analysis by utilizing Android's runtime In addition, the reference lists of studies that were included
environment is “TaintDroid” by Enck et al [5]. By Lantz because they satisfied the criteria for inclusion were
[9], a completely automated user emulation and reporting combed through in order to look for prospective research
system that goes by the name “Droidbox” was added to that might fit those criteria and be added. As a result of our
this system. “Droidbox” is a powerful tool for analyzing investigation, we were made aware of a hole in the
Android apps, however it doesn't have the ability to log research, and we proposed that it be filled by improving
native API calls. The very first system integrating static the testing of the mobile applications troths CuckooDroid
and dynamic analysis for the Android platform in a very Sandbox that were developed in relation to the analyzed
primitive manner was the AASandbox system by Bläsing malware detection system that was developed by us. This
et al [10]. Sadly, it appears that AASandbox is no longer realization came about as a direct result of our having
being managed. DroidRanger is a system developed by discovered the hole in the research. The realization that
Zhou et al [11]. that combines static and dynamic analysis. there was a gap in our knowledge initially sparked the
DroidRanger uses a mix of permission-based behavioral thought that we should do this. It is necessary to carry out
foot prints to identify samples of existing well-known these steps in order for the gap to be filled.
malware families and a heuristic-based filtering method to As the second step to examine it and test Android
identify unidentified harmful groups. applications, the CuckooDroid sandbox first has to be
installed. There are three options for installing this
sandbox. Android on Linux Machine, Android Emulator,
Android Device Cross-platform. Using the first approach,
we have installed it. The data, which consists of android
application files, was gathered from the online sources. We
obtained around 30 samples from web surfing, and we also
obtained about 3000 samples from the Canadian Institute
for Cyber Security [12] by reading various study articles.
Even though we obtained many samples, we were unable
to test them all since CuckooDroid only supports Android
4.1.2, while our samples were unable to install on the
emulator due to an outdated SDK version.
72 This work is licensed under Creative Commons Attribution 4.0 International License.
International Journal of Engineering and Management Research e-ISSN: 2250-0758 | p-ISSN: 2394-6962
Volume-12, Issue-6, (December 2022)
www.ijemr.net https://doi.org/10.31033/ijemr.12.6.9
73 This work is licensed under Creative Commons Attribution 4.0 International License.
International Journal of Engineering and Management Research e-ISSN: 2250-0758 | p-ISSN: 2394-6962
Volume-12, Issue-6, (December 2022)
www.ijemr.net https://doi.org/10.31033/ijemr.12.6.9
74 This work is licensed under Creative Commons Attribution 4.0 International License.