Introduction to Malware Techniques and Logics - Part 1
|Description||Following the great works by EvilCry, I have decided itâ€™s time to release some of my past and present works on Malware Analysis (some of them will be coming soon). This is in the hope of igniting some interests in Malware Analysis via Reverse Engineersâ€™ mindset.
This tutorial is written to provide a better understanding of where to find information and what is the aim of most Trojans. Their aim is simply to steal information or to act as a Bot in a Botnet. Please note that this article has been written for learning purposes and not for complex functionality. In the early days, there were many incidents where users received emails with malicious CHM (Microsoft Compiled HTML Help) and DOC (Microsoft Office Word Document) attachments containing Trojan Riler which is also known as BackDoor-BCB.
So I have decided to impart some of my knowledge on Forensics in order to complete this tutorial, writing â€œIntroduction to Malware Techniques and Logics part 1â€. The tutorial will cover different issues:
â€¢ How to decompile .CHM files.
â€¢ How to detect and analyse the shellcode
â€¢ How to dump the backdoor components
â€¢ How to discover the communication protocol
I hope that this could begin a new chapter in the ongoing series of Reverse Engineering and Forensics guides from ARTeam and spark a new interest. Todayâ€™s topic will go over â€œIntroduction to Malware Techniques and Logics part 1â€.
This paper attempts to document an approach on how the malware developers make use of the Macros and vulnerabilities to install malicious software on the vulnerable machine. We hope this document will help the future Reverse Engineers and Forensics guys / gals to conduct a more viable and comprehensive research.
This article does not claim to be complete, exclusivity and is geared towards beginners.
|Image||no image available|
|Date||Friday 28 August 2009 - 15:04:27|
0/5 : Not rated