menu
techminis

A naukri.com initiative

google-web-stories
Home

>

Malware News

>

A Deep Div...
source image

Medium

1w

read

190

img
dot

Image Credit: Medium

A Deep Dive into Malware Static Analysis: Dissecting Windows Reverse Shell for Threat Insights

  • John, the junior security analyst, conducted static analysis on a reverse shell malware to gather insights on the threat.
  • In static analysis, the file type of the malware was determined to be a 64-bit Windows PE file using tools like 'file' command on Kali Linux and hexdump.
  • Hashes (MD5, SHA1, SHA256) were generated for the malware to identify replicas and search for results online.
  • By analyzing the strings in the binary, John found clues that the malware communicated over the internet using cmd.exe.
  • Comments in the code and the type of strings present provided insights into the functionality and possible development environment of the malware.
  • Detection of a packed file, indicated by decreased file size and lack of readable strings, led to the discussion on packers, cryptors, and tools like ExeInfo for unpacking.
  • Further analysis involved examining PE Headers, DOS Header, File Header, Optional Header, sections, and imports to gather more information on the malware.
  • The compilation date, application type, and imported functions provided additional details on the malware's behavior.
  • Overall, John's thorough analysis provided a deeper understanding of the malware's structure and functionalities despite attempts to obfuscate it.
  • The article emphasizes the importance of static analysis in dissecting malware to unveil its potential threats and capabilities.

Read Full Article

like

11 Likes

For uninterrupted reading, download the app