Labs

The goal of the labs for this chapter is to help you to understand the overall functionality of a program by analyzing code constructs. Each lab will guide you through discovering and analyzing a new code construct. Each lab builds on the previous one, thus creating a single, complicated piece of malware with four constructs. Once you’ve finished working through the labs, you should be able to more easily recognize these individual constructs when you encounter them in malware.

Lab 6-1

In this lab, you will analyze the malware found in the file Lab06-01.exe.

Questions

Q:

1. What is the major code construct found in the only subroutine called by main?

Q:

2. What is the subroutine located at 0x40105F?

Q:

3. What is the purpose of this program?

Lab 6-2

Analyze the malware found in the file Lab06-02.exe.

Questions

Q:

1. What operation does the first subroutine called by main perform?

Q:

2. What is the subroutine located at 0x40117F?

Q:

3. What does the second subroutine called by main do?

Q:

4. What type of code construct is used in this subroutine?

Q:

5. Are there any network-based indicators for this program?

Q:

6. What is the purpose of this malware?

Lab 6-3

In this lab, we’ll analyze the malware found in the file Lab06-03.exe.

Questions

Q:

1. Compare the calls in main to Lab 6-2 Solutions’s main method. What is the new function called from main?

Q:

2. What parameters does this new function take?

Q:

3. What major code construct does this function contain?

Q:

4. What can this function do?

Q:

5. Are there any host-based indicators for this malware?

Q:

6. What is the purpose of this malware?

Lab 6-4

In this lab, we’ll analyze the malware found in the file Lab06-04.exe.

Questions

Q:

1. What is the difference between the calls made from the main method in Lab 6-3 Solutions and Lab 6-4 Solutions?

Q:

2. What new code construct has been added to main?

Q:

3. What is the difference between this lab’s parse HTML function and those of the previous labs?

Q:

4. How long will this program run? (Assume that it is connected to the Internet.)

Q:

5. Are there any new network-based indicators for this malware?

Q:

6. What is the purpose of this malware?

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
18.225.255.187