First.
Malicious code analysis target
1. Based on the host's feature code, used to detect malicious code on the infected host
2. Network feature codes, detect malicious codes by monitoring network traffic
Second. Types of
malicious code back door
Botnet
Downloader
Spyware
Launcher
Kernel kit
Ransomware
Malicious code for sending spam
Worms or computer viruses
Third. Malicious code analysis technology
1. Basic technology of static analysis
Static analysis tools:
Use the PEiD shell search tool to detect the type of packer, or the type of compiler used to link the application.
Use the Dependency Walker tool to explore dynamic link functions.
Use PEview to analyze PE files.
Use the Resource Hacker tool to view the resource section.
2. Basic technology of dynamic analysis
Sandbox: Use malicious code sandbox, such as Norman sandbox and GFI sandbox.
Run malicious code: Run DLL: rundll32.exe program is included in all windows versions.
Syntax format: rundll32.exe DLLname, Export arguments
</br>Export value must be the function name or serial number in the exported function table of a DLL file.
3. Advanced technology of static analysis
4. Advanced technology of dynamic analysis
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.