From: An emerging threat Fileless malware: a survey and research challenges
Techniques | Traditional file-based malware | Fileless malware |
---|---|---|
Source code | Yes | No |
Malicious file | Yes | No |
Malicious process | Yes | No (Uses trusted OS processes) |
Complexity | Moderate | Very high |
Detection complexity | Moderate | Very high |
Persistence | Medium | Low |
File Types | • Executable files • Script embedded in a format that executes scripts (PDF, Word, Excel etc.,) | • JavaScrpt • WMI • PowerShell • Flash • WScript/ CScript |
Targets | Executable file with single targeted OS/ patch level combination | Can target many different OS/ path level combinations |
Obfuscation methods | • Encrypt file • Archive file • Executable file disguised as another type of file • Executable file embedded in another file | • Encoding • Escaped ASCII/ Unicode values • String splitting • Encryption • Randomization • Data obfuscation • Logic structure obfuscation • White space |
Anti-virus detection | Possible with known signature | Not possible |
Sandboxes detection | Physically availability of file | Not possible |
Behavior-based heuristics and unsupervised machine learning | File-based malware shows abnormal behavior in the system after compromising the targeted host. Hence, these systems are designed to detect such behavior. | Fileless attacks are designed to behave like a benign process in the system, so they may not alarm as an anomaly. Hence, very difficult to detect. |