John, the junior security analyst, conducted static analysis on a reverse shell malware to gather insights on the threat.
In static analysis, the file type of the malware was determined to be a 64-bit Windows PE file using tools like 'file' command on Kali Linux and hexdump.
Hashes (MD5, SHA1, SHA256) were generated for the malware to identify replicas and search for results online.
By analyzing the strings in the binary, John found clues that the malware communicated over the internet using cmd.exe.
Comments in the code and the type of strings present provided insights into the functionality and possible development environment of the malware.
Detection of a packed file, indicated by decreased file size and lack of readable strings, led to the discussion on packers, cryptors, and tools like ExeInfo for unpacking.
Further analysis involved examining PE Headers, DOS Header, File Header, Optional Header, sections, and imports to gather more information on the malware.
The compilation date, application type, and imported functions provided additional details on the malware's behavior.
Overall, John's thorough analysis provided a deeper understanding of the malware's structure and functionalities despite attempts to obfuscate it.
The article emphasizes the importance of static analysis in dissecting malware to unveil its potential threats and capabilities.