2018년 8월 7일 화요일

Practical Malware Analysis - review 1

Static Analysis - The program itself is not run at this time(In contrast, when performing dynamic analysis actually runs the program.)

Sometimes the strings detected by the Strings program are not actual strings. Those bytes could be a memory address, CPU instructions, or data used by the program. Often, the most useful information obtained by running Strings is found in error messages.

DLL itself is not necessarily malicious; malware often uses legitimate libraries and DLLs to further its goals.

If upon searching a program with Strings, you find that it has only a few strings, it is probably either obfuscated or packed, suggesting that it may be malicious.

Packed and obfuscated code will often include at least the functions LoadLibrary and GetProcAddress, which are used to load and gain access to additional functions.

- LoadLibrary : Loads the specified module into the address space of the calling process. The specified module may cause other modules to be loaded.

- GetProcAddress : Retrieves the address of an exported function or variable from the specified dynamic-link library (DLL).

댓글 없음:

댓글 쓰기

[프로그래머스] 프린터 (자바/Java)

문제 설명 일반적인 프린터는 인쇄 요청이 들어온 순서대로 인쇄합니다. 그렇기 때문에 중요한 문서가 나중에 인쇄될 수 있습니다. 이런 문제를 보완하기 위해 중요도가 높은 문서를 먼저 인쇄하는 프린터를 개발했습니다. 이 새롭게 개발한 프린터는 아래와 같은...