Brain Dump
  • Description
  • Reversing
    • IOLI Crackme 0x00
    • IOLI Crackme 0x01
    • IOLI Crackme 0x02
  • Malware Analysis
    • Mozi Botnet
    • VBS.Dunihi
    • SUNNYSTATION
    • PMA Chapter 1 - Labs
      • PMA Chapter 1-02 - Labs
      • PMA Chapter 1-03 - Labs
      • PMA Chapter 1-04 - Labs
Powered by GitBook
On this page

Was this helpful?

  1. Malware Analysis
  2. PMA Chapter 1 - Labs

PMA Chapter 1-02 - Labs

Labs answers from the book "Practical Malware Analysis". Chapter 1.

PreviousPMA Chapter 1 - LabsNextPMA Chapter 1-03 - Labs

Last updated 3 years ago

Was this helpful?

Lab 1-2

This lab uses the file Lab01-02.exe

Questions

Upload the Lab01-02.exe file to http://www.VirusTotal.com/. Does it match any existing antivirus definitions?

yes, the file was detected by several vendors.

Are there any indications that this file is packed or obfuscated? If so, what are these indicators? If the file is packed, unpack it if possible.

Yes, the file is packaged with UPX, we detect it by identifying the UPX magic numbers "555058" which is ASCII would be "UPX".

Do any imports hint at this program’s functionality? If so, which imports are they and what do they tell you?

First we unpack the file to be able to analyze it. When reviewing the file you can see that it makes use of the wininet dll which contains higher-level networking functions that implement protocols such as FTP, HTTP, and NTP. Checking the strings we can see that it tries to open a page.

What host- or network-based indicators could be used to identify this malware on infected machines?

http://malwareanalysisbook.com

PE Bear output.
Unpacking the File.
PE Bear Output
PE Bear Output 2.