Practical Malware Analysis Lab9

本文详细介绍了Practical Malware Analysis Lab9中的恶意软件行为。当无注册表值或参数错误时,程序会自我删除。程序在注册表中创建键值,并根据参数执行不同任务,如修改键值、创建和删除服务。服务以自启动方式创建,实现开机运行。当程序无参数执行时,执行包括上传、下载、命令行操作等功能。此外,还提到了一个简单的后门,通过创建cmd进程并连接socket实现反向shell功能。
摘要由CSDN通过智能技术生成

Lab9-1

不走程序直接逆。标注完的主函数如下

int __cdecl main(int argc, const char **argv, const char **envp)
{
  char port; // [sp+10h] [bp-181Ch]@31
  char ups; // [sp+410h] [bp-141Ch]@31
  char url; // [sp+810h] [bp-101Ch]@31
  char sleep_time; // [sp+C10h] [bp-C1Ch]@31
  CHAR serviceName; // [sp+1024h] [bp-808h]@18
  CHAR ServiceName; // [sp+1428h] [bp-404h]@9
  char *param; // [sp+1828h] [bp-4h]@5

  if ( argc == 1 )
  {
    if ( !sub_401000() )
      del_self();
    sub_402360();
  }
  else
  {
    param = (char *)argv[argc - 1];             // abcd
    if ( !sub_402510(param) )
      del_self();
    if ( _mbscmp((const unsigned __int8 *)argv[1], aIn) )// -in
    {
      if ( _mbscmp((const unsigned __int8 *)argv[1], aRe) )// -re
      {
        if ( _mbscmp((const unsigned __int8 *)argv[1], aC_0) )// -c p7
        {
          if ( _mbscmp((const unsigned __int8 *)argv[1], aCc) )// -cc
            del_self();
          if ( argc != 3 )
            del_self();
          if ( !getKey(&ups, 1024, &url, 1024, &port, 1024, &sleep_time) )// -cc abcd
            sub_402E7E((int)aKSHSPSPerS, (int)&ups);// k:%s h:%s p:%s per:%s
        }
        else
        {
          if ( argc != 7 )                      // -c m n x y abcd
            del_self();
          SetKey(arg
Malware analysis is big business, and attacks can cost a company dearly. When malware breaches your defenses, you need to act quickly to cure current infections and prevent future ones from occurring. For those who want to stay ahead of the latest malware, Practical Malware Analysis will teach you the tools and techniques used by professional analysts. With this book as your guide, you'll be able to safely analyze, debug, and disassemble any malicious software that comes your way. You'll learn how to: Set up a safe virtual environment to analyze malware Quickly extract network signatures and host-based indicators Use key analysis tools like IDA Pro, OllyDbg, and WinDbg Overcome malware tricks like obfuscation, anti-disassembly, anti-debugging, and anti-virtual machine techniques Use your newfound knowledge of Windows internals for malware analysis Develop a methodology for unpacking malware and get practical experience with five of the most popular packers Analyze special cases of malware with shellcode, C++, and 64-bit code Hands-on labs throughout the book challenge you to practice and synthesize your skills as you dissect real malware samples, and pages of detailed dissections offer an over-the-shoulder look at how the pros do it. You'll learn how to crack open malware to see how it really works, determine what damage it has done, thoroughly clean your network, and ensure that the malware never comes back. Malware analysis is a cat-and-mouse game with rules that are constantly changing, so make sure you have the fundamentals. Whether you're tasked with securing one network or a thousand networks, or you're making a living as a malware analyst, you'll find what you need to succeed in Practical Malware Analysis.
评论
添加红包

请填写红包祝福语或标题

红包个数最小为10个

红包金额最低5元

当前余额3.43前往充值 >
需支付:10.00
成就一亿技术人!
领取后你会自动成为博主和红包主的粉丝 规则
hope_wisdom
发出的红包
实付
使用余额支付
点击重新获取
扫码支付
钱包余额 0

抵扣说明:

1.余额是钱包充值的虚拟货币,按照1:1的比例进行支付金额的抵扣。
2.余额无法直接购买下载,可以购买VIP、付费专栏及课程。

余额充值