Detecting Cryptomining Malware: a Deep Learning Approach for Static and Dynamic Analysis

Hamid Darabian,Sajad Homayounoot,Ali Dehghantanha,Sattar Hashemi,Hadis Karimipour,Reza M. Parizi,Kim-Kwang Raymond Choo
DOI: https://doi.org/10.1007/s10723-020-09510-6
2020-01-21
Journal of Grid Computing
Abstract:Cryptomining malware (also referred to as cryptojacking) has changed the cyber threat landscape. Such malware exploits the victim's CPU or GPU resources with the aim of generating cryptocurrency. In this paper, we study the potential of using deep learning techniques to detect cryptomining malware by utilizing both static and dynamic analysis approaches. To facilitate dynamic analysis, we establish an environment to capture the system call events of 1500 Portable Executable (PE) samples of the cryptomining malware. We also demonstrate how one can perform static analysis of PE files' opcode sequences. In our study, we evaluate the performance of using Long Short-Term Memory (LSTM), Attention-based LSTM (ATT-LSTM), and Convolutional Neural Networks (CNN) on our sequential data (opcodes and system call invocations) for classification by a Softmax function. We achieve an accuracy rate of 95% in the static analysis and an accuracy rate of 99% in the dynamic analysis.
computer science, information systems, theory & methods
What problem does this paper attempt to address?