当前位置:网站首页>Actual combat analysis of malicious code lab05-01
Actual combat analysis of malicious code lab05-01
2022-06-13 10:52:00 【Wangchenfeng】
Lab05-01
Only IDA Pro Analysis in file Lab05-01.dll Malicious code found in . The goal of this experiment is to give you a IDA Pro Hands on experience . If you already use IDA Pro Worked , You can choose to ignore these problems , Instead, focus on Reverse Engineering malicious code .
More content , More later
1.DllMain What's the address of ?
Use IDA After opening , Where the mouse is
Or click on the red area in the figure
Then it will appear viewB
Then you can right-click
It's here dllmain Start address of .
2. Use Imports Window and browse to gethostbyname, What address does the import function locate ?
Search function names directly
Double click directly on the function , Find the location address in the original text . Is in .idata
Chaste 0x100163CC
It's about .
In fact, the above figure has already given the address .
3. How many functions have called gethostbyname?
In this viewB Window ,ctrl+x.Jump to xref to oprand.
Or right click
Function cross reference ,p Is quoted ,r Is read , First read , To quote . Refer to the 9 Time , By 5 Function calls .
This shows 18 That's ok , But it's not 18 A function called this gethostbyname.
+ The following is the offset address .
4. Concentrate on 0x10001757 Right at gethostbyname Call to , You can find that DNS Will the request be triggered ?
Close the external reference window , Then press G, Direct positioning 0x10001757 Jump past
5.IDA Pro Identified in 0x10001656 How many local variables in the subprocess at ?
6.IDA Pro Identified in 0x10001656 How many parameters in the subprocess at ?
7. Use Strings window , To locate the string in disassembly \cmd.exe /c. Where is it located ?
8. In reference to \cmd.exe /c What happens in the area where your code is located ?
9. In the same area , stay 0x100101C8 It's about , Look like dword_1008E5C4 Is a global variable , It helps decide which path to take . How is the malicious code set dword_1008E5C4 What about ?( Tips : Use dword_1008E5C4 Cross references to .)
10. Located in 0x1000FF58 Among the hundreds of lines of instructions in the subprocess at , A series of uses memecmp To compare strings . If the robotwork The string comparison is successful ( When memcmp return 0), What's going to happen ?
11.PSLIST What does the export function do ?
12. Use graph mode to draw pairs of sub_10004E79 Cross reference diagram of . When you enter this function , that API The function may be called ? Just based on these API function , How would you rename this function ?
13.DLLMain How many... Are called directly Windows API? How many at a depth of 2 When called ?
14. stay 0x10001358 It's about , There is one right Sleep( A parameter that uses a parameter that contains the number of milliseconds to sleep API function ) Call to . Look back along the code , If this code executes , How long does this program sleep ?
15. stay 0x10001701 The place is a pair of socket Call to . its 3 What are the two parameters ?
16. Use MSDN Page socket and IDA Pro Named symbolic constants in , Can you make the parameters more meaningful ? After you apply the changes , What are the parameters ?
17. Search for in Instructions (opcode 0xED) Use . This instruction and a magic string VMXh Used for VMware testing . Is this used in this malicious code ? Use to execute in Cross reference of instruction function , Can detect further VMware Evidence of ?
18. Jump your cursor to 0x1001D988 It's about , What did you find ?
边栏推荐
- About instruction set bits and instruction architecture bits
- Private computing fat core concepts and stand-alone deployment
- D evaluate twice map
- Similarities and differences between decoration mode and agency mode
- 第六章 I/O管理作业
- Advanced technology management - what management tools can managers use
- Electrolytic capacitor, tantalum capacitor, ordinary capacitor
- Pagoda access changed from IP to domain name
- Understand an article: Spark operation mode
- Review of last week's hot spots (6.6-6.12)
猜你喜欢
Codeforces Round #798 (Div. 2)ABCD
电解电容、钽电容、普通电容
Codeforces Round #798 (Div. 2)ABCD
Redis相关
中国SaaS产业全景图谱
Full stack development practice | integrated development of SSM framework
flutter简单优秀的开源dialog使用free_dialog
终于,月入 20000 !!
Actual combat simulation │ real time error alarm of enterprise wechat robot
Actual combat simulation │ real time error alarm of enterprise wechat robot
随机推荐
21世纪以来的历次“粮食危机”,发生了什么?
Full stack development practice | integrated development of SSM framework
MySQL transaction isolation level and mvcc
Go 要加个箭头语法,这下更像 PHP 了!
vivo大规模 Kubernetes 集群自动化运维实践
音视频技术开发周刊 | 249
2022煤矿探放水特种作业证考试题库模拟考试平台操作
低代码开发一个基础模块
服务器的使用
Questions and answers of the labor worker general basic (labor worker) work license in 2022
[cloud enjoying freshness] community weekly · vol.66- Huawei partners and Developers Conference 2022 wonderful agenda announcement
Understand an article: Spark operation mode
D generate unique ID at compile time
宝塔中navicat连接mysql
Simple query cost estimation [Gauss is not a mathematician this time]
Install Kubernetes 1.24
第六章 I/O管理作业
2022 tailings recurrent training question bank and simulated examination
deepin系统中Qt5.12无法输入中文(无法切换中文输入法)解决办法
China SaaS industry panorama