Malware Analysis Road Map and essential tools

teto2005

Level 1
Thread author
May 14, 2017
3
Hello Guys
I am new here and I am not sure if I am at the right place or not.
I am seeking your advice to learn Malware Analysis "static" as I am not good at Assembly.
Besides, to the required tools to perform the analysis and the road map.
Thanks alot :)
 
  • Like
Reactions: askmark and Rengar

Winter Soldier

Level 25
Verified
Top Poster
Well-known
Feb 13, 2017
1,486
Hello

Well the static analysis consists in analyzing a malware without starting it, studying the code, and the functions to determine its behavior but it is really very difficult to explain concepts, especially if you don't know assembly.

Lets say that usually .NET malware (not obfuscated) can be investigated by accessing the code with ILSpy for example.
About malware written in C/C++, it is more complex because it is virtually impossible to go back to the source code, starting from the executable.

Here you can use PEiD, which can be useful for the investigation of strings and file sections both useful to understand the malware's behavior.

For example here the files sections:

- .text contains instructions that CPU will run (the executable code);
- .rdata usually contains the information to import and export. It can also save from the read-only data used by malware;
- .data contains the global data of the executable;
- .rsrc contains the resources used by the executable that are not considered to be part of it, such as icons, images, and strings.

Of course the topic is very complex.
 

teto2005

Level 1
Thread author
May 14, 2017
3
Thanks alot for your reply.
Would you please recommend assembly ref.?
Hello

Well the static analysis consists in analyzing a malware without starting it, studying the code, and the functions to determine its behavior but it is really very difficult to explain concepts, especially if you don't know assembly.

Lets say that usually .NET malware (not obfuscated) can be investigated by accessing the code with ILSpy for example.
About malware written in C/C++, it is more complex because it is virtually impossible to go back to the source code, starting from the executable.

Here you can use PEiD, which can be useful for the investigation of strings and file sections both useful to understand the malware's behavior.

For example here the files sections:

- .text contains instructions that CPU will run (the executable code);
- .rdata usually contains the information to import and export. It can also save from the read-only data used by malware;
- .data contains the global data of the executable;
- .rsrc contains the resources used by the executable that are not considered to be part of it, such as icons, images, and strings.

Of course the topic is very complex.
 
  • Like
Reactions: Game Of Thrones

About us

  • MalwareTips is a community-driven platform providing the latest information and resources on malware and cyber threats. Our team of experienced professionals and passionate volunteers work to keep the internet safe and secure. We provide accurate, up-to-date information and strive to build a strong and supportive community dedicated to cybersecurity.

User Menu

Follow us

Follow us on Facebook or Twitter to know first about the latest cybersecurity incidents and malware threats.

Top