Analysing packed and encrypted malware using binary analysis
Keywords:
Binary analysis, Malware detection, Opcode profiling, Static analysisAbstract
The increasing use of packing and encryption techniques in malware poses a major challenge to traditional signature-based antivirus systems. The aim of this study presents a lightweight static analysis framework for detecting executables that employ evasion strategies such as packing and encryption. The methodology integrates entropy measurement, section header analysis, opcode frequency profiling, and import table inspection to identify concealed malicious behaviour without executing the sample. The system was implemented in Python using PEfile, Capstone, Tkinter, and Matplotlib. Testing with benign, packed, and encrypted executables demonstrated effective differentiation between normal and obfuscated binaries, achieving an overall detection accuracy of 91.7%. The proposed system provides a transparent and resource-efficient solution suitable for academic environments, malware research, and preliminary digital forensic investigations. This research will reduce the threats posed by the malwares, adversaries and will ensure safety and security in the digital world.