Exactly my point, yes- especially if one were to make a framework designed to 
easily analyse such things (when it becomes much easier for the malware because 
it for instance could just check whether the framework is in the current env 
(as a super-trivial example- but any framework that is easy to run is likely to 
be easy to adapt to for this sort of code).

It'd certainly be feasible to check for outgoing calls though, at least for 
relatively simple cases (on-import, when calling with particular args), but I 
think the licensing, etc issues are probably easier to solve-ish and maintain, 
so probably a better starting point. This is just a gut feeling though- I've 
done this stuff manually in the past when I've needed to.

Thanks,
S

On 27/07/17 14:41, Mike Eriksson wrote:


On Thu, Jul 27, 2017 at 2:39 PM Andy Robinson 
<a...@reportlab.com<mailto:a...@reportlab.com>> wrote:
On 27 July 2017 at 15:33, S Walker 
<walke...@hotmail.co.uk<mailto:walke...@hotmail.co.uk>> wrote:
> I suspect malicious phone-home (and other deliberately malicious security)
> stuff would be very difficult to automatically test for

Presumably you want to spy on outbound network activity from your test
machine, rather than analysing code?


That is if they haven't written their code so it is aware of the 
characteristics of 'malware analytics environments'. Basically it's dormant if 
it thinks it is being observed. Something which is very common these days. At 
least at the cutting edge of such things.

Cheers, Mike



_______________________________________________
python-uk mailing list
python-uk@python.org<mailto:python-uk@python.org>
https://mail.python.org/mailman/listinfo/python-uk


_______________________________________________
python-uk mailing list
python-uk@python.org
https://mail.python.org/mailman/listinfo/python-uk

Reply via email to