Uncovering Hidden Malicious Functionality: A Comprehensive Malware Dissection Approach
Uncovering Hidden Malicious Functionality: A Comprehensive Malware Dissection Approach
Ashish Revar,Shakti Mishra,R. Jhaveri
TLDR
This study thoroughly uses both methods on eight real samples from six malware families to discover malicious patterns in how they act and establishes significant differences between static signatures and dynamic behavior, demonstrating that hybrid approaches are required for accurate malware classification.
Abstract
Malware analysis is crucial part of cybersecurity that is essential to researchers in order to completely understand malicious software behaviour and come up with methods that can discover it. Despite file structures and API integrations being checked thoroughly through static analysis without execution, it is always missing dynamic actions. Despite its monitoring real operations, dynamic analysis is both resource intensive and susceptible to analysis prevention techniques. This study thoroughly uses both methods on eight real samples from six malware families to discover malicious patterns in how they act. All our finding underline why hybrid analysis should be done for powerful malware detection. Malware familial classification also requires hybrid analysis. Our analysis establishes significant differences between static signatures and dynamic behavior and demonstrates that hybrid approaches are required for accurate malware classification.

