IJSTR

International Journal of Scientific & Technology Research

IJSTR@Facebook IJSTR@Twitter IJSTR@Linkedin
Home About Us Scope Editorial Board Blog/Latest News Contact Us
CALL FOR PAPERS
AUTHORS
DOWNLOADS
CONTACT
QR CODE
IJSTR-QR Code

IJSTR >> Volume 4 - Issue 4, April 2015 Edition



International Journal of Scientific & Technology Research  
International Journal of Scientific & Technology Research

Website: http://www.ijstr.org

ISSN 2277-8616



Video Malware - Behavioral Analysis

[Full Text]

 

AUTHOR(S)

Rajdeepsinh Dodia, Priyanka Bhati, Kvvprasad, Anil Anisetti

 

KEYWORDS

Key words: Malware, Malware Analysis, Key logger, Funny Video, dynamic analysis, malware detection, video malware

 

ABSTRACT

Abstract: The counts of malware attacks exploiting the internet increasing day by day and has become a serious threat. The latest malware spreading out through the media players embedded using the video clip of funny in nature to lure the end users. Once it is executed and installed, then the behavior of the malware is in the malware author’s hand. The spread of the malware emulates through Internet, USB drives, sharing of the files and folders can be anything which makes presence concealed. The “funny video” named as it connected to the film celebrity where the malware variant was collected from the laptop of the terror outfit organization .It runs in the backend which it contains malicious code which steals the user sensitive information like banking credentials, username & password and send it to the remote host user called command & control. The stealed data is directed to the email encapsulated in the malicious code. The potential malware will spread through the USB and other devices .In summary, the analysis reveals the presence of malicious code in executable video file and its behavior.

 

REFERENCES

[1] https://msdn.microsoft.com/en-us/library/windows/desktop/ms644959(v=vs.85).aspx#wh_keyboard_llhook

[2] http://en.wikipedia.org/wiki/Malware

[3] http://www.sans.org/reading-room/whitepapers/malicious/malware-analysis-introduction-2013

[4] https://technet.microsoft.com/en-in/sysinternals/bb842062.aspx