SlidePub
Home
Categories
Login
Register
Home
General
Empowering Malware Analysis with IDA AppCall
Empowering Malware Analysis with IDA AppCall
sbc-vn
3,340 views
61 slides
Oct 03, 2024
Slide
1
of 61
Previous
Next
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
About This Presentation
Empowering Malware Analysis
with IDA AppCall
Size:
11.44 MB
Language:
en
Added:
Oct 03, 2024
Slides:
61 pages
Slide Content
Slide 1
Empowering Malware Analysis
with IDA AppCall
m4n0w4r
10/1/2024 1
#Security_Bootcamp_2024 #Phú_Quốc
Slide 2
#Wh0_4m_1?
10/1/2024 Empowering Malware Analysis with IDA AppCall Feature 2
Slide 3
What we will cover
10/1/2024 Empowering Malware Analysis with IDA AppCall Feature 3
Slide 4
Summary of Appcall in IDA (1)
•
•
•
•
10/1/2024 Empowering Malware Analysis with IDA AppCall Feature 4
Slide 5
Summary of Appcall in IDA (2)
•
•
•
•
10/1/2024 Empowering Malware Analysis with IDA AppCall Feature 5
Slide 6
A simple example (1)
10/1/2024 Empowering Malware Analysis with IDA AppCall Feature 6
Slide 7
A simple example (2)
10/1/2024 Empowering Malware Analysis with IDA AppCall Feature 7
Slide 8
A simple example (3)
10/1/2024 Empowering Malware Analysis with IDA AppCall Feature 8
Slide 9
A Great Explanation Video
10/1/2024 Empowering Malware Analysis with IDA AppCall Feature 9
Slide 10
Quote Of The Day
10/1/2024 Empowering Malware Analysis with IDA AppCall Feature 10
Slide 11
LOKIBOT
10/1/2024 11
Slide 12
LokiBot (1)
10/1/2024 Empowering Malware Analysis with IDA AppCall Feature 12
Slide 13
LokiBot (2)
10/1/2024 Empowering Malware Analysis with IDA AppCall Feature 13
Slide 14
Our analysis
Reversing
LokiBot
10/1/2024 Empowering Malware Analysis with IDA AppCall Feature 14
Slide 15
LokiBot Infection Chain
10/1/2024 Empowering Malware Analysis with IDA AppCall Feature 15
Slide 16
Dynamic Resolve API Functions
10/1/2024 Empowering Malware Analysis with IDA AppCall Feature 16
Slide 17
Hardcore Reverser –try hard to understand logic
10/1/2024 Empowering Malware Analysis with IDA AppCall Feature 17
Slide 18
Hardcore Reverser –reimplement code
10/1/2024 Empowering Malware Analysis with IDA AppCall Feature 18
Slide 19
Extreme Reverser –try to find lazy way
•
•
•
10/1/2024 Empowering Malware Analysis with IDA AppCall Feature 19
Slide 20
Recover API Name with IDA AppCall (1)
•
10/1/2024 Empowering Malware Analysis with IDA AppCall Feature 20
Slide 21
Recover API Name with IDA AppCall (2)
•
10/1/2024 Empowering Malware Analysis with IDA AppCall Feature 21
Slide 22
Recover API Name with IDA AppCall (3)
•
10/1/2024 Empowering Malware Analysis with IDA AppCall Feature 22
Slide 23
Recover API Name with IDA AppCall (4)
10/1/2024 Empowering Malware Analysis with IDA AppCall Feature 23
Slide 24
Result
10/1/2024 Empowering Malware Analysis with IDA AppCall Feature 24
Slide 25
10/1/2024 Empowering Malware Analysis with IDA AppCall Feature 25
Slide 26
Our analysis
EMOTET
10/1/2024 26
Slide 27
For those who don’t know (1)
10/1/2024 Empowering Malware Analysis with IDA AppCall Feature 27
Slide 28
For those who don’t know (2)
10/1/2024 Empowering Malware Analysis with IDA AppCall Feature 28
Slide 29
For those who don’t know (3)
•
10/1/2024 Empowering Malware Analysis with IDA AppCall Feature 29
Slide 30
For those who don’t know (4)
10/1/2024 Empowering Malware Analysis with IDA AppCall Feature 30
Slide 31
For those who don’t know (5)
10/1/2024 Empowering Malware Analysis with IDA AppCall Feature 31
Slide 32
For those who don’t know (6)
10/1/2024 Empowering Malware Analysis with IDA AppCall Feature 32
Slide 33
For those who don’t know (7)
10/1/2024 Empowering Malware Analysis with IDA AppCall Feature 33
Slide 34
And Meme Everywhere…
10/1/2024 Empowering Malware Analysis with IDA AppCall Feature 34
Slide 35
For those who don’t know (8)
10/1/2024 Empowering Malware Analysis with IDA AppCall Feature 35
Slide 36
From “Dong Lao” with Love
10/1/2024 Empowering Malware Analysis with IDA AppCall Feature 36
Slide 37
From “Dong Lao” with Love
10/1/2024 Empowering Malware Analysis with IDA AppCall Feature 37
Slide 38
Our analysis
Reversing
Emotet
10/1/2024 38
Slide 39
Reversing Engineering Emotet
10/1/2024 Empowering Malware Analysis with IDA AppCall Feature 39
Slide 40
Context (1)
10/1/2024 Empowering Malware Analysis with IDA AppCall Feature 40
Slide 41
Context (2)
10/1/2024 Empowering Malware Analysis with IDA AppCall Feature 41
Slide 42
Decrypt Strings
•
10/1/2024 Empowering Malware Analysis with IDA AppCall Feature 42
Slide 43
Decrypt Strings (1)
•
10/1/2024 Empowering Malware Analysis with IDA AppCall Feature 43
Slide 44
Decrypt Strings (2)
•
10/1/2024 Empowering Malware Analysis with IDA AppCall Feature 44
Slide 45
Decrypt Strings (3) (Pseudocode)
10/1/2024 Empowering Malware Analysis with IDA AppCall Feature 45
Slide 46
Decrypt Strings (4) (Verify)
•
•
10/1/2024 Empowering Malware Analysis with IDA AppCall Feature 46
Slide 47
Decrypt Strings (5) (Solution?)
•
•
•
•
10/1/2024 Empowering Malware Analysis with IDA AppCall Feature 47
Slide 48
Recover Original Strings with IDA AppCall(1)
•
10/1/2024 Empowering Malware Analysis with IDA AppCall Feature 48
Slide 49
Recover Original Strings with IDA AppCall(2)
10/1/2024 Empowering Malware Analysis with IDA AppCall Feature 49
Slide 50
10/1/2024 Empowering Malware Analysis with IDA AppCall Feature 50
Slide 51
Extract C2s Configuration (1)
•
10/1/2024 Empowering Malware Analysis with IDA AppCall Feature 51
Slide 52
Extract C2s Configuration (2)
10/1/2024 Empowering Malware Analysis with IDA AppCall Feature 52
Slide 53
Extract C2s Configuration (3)
10/1/2024 Empowering Malware Analysis with IDA AppCall Feature 53
Slide 54
Extract C2s Configuration (4)
•
10/1/2024 Empowering Malware Analysis with IDA AppCall Feature 54
Slide 55
Automate Extract C2s using IDA AppCall(1)
•
10/1/2024 Empowering Malware Analysis with IDA AppCall Feature 55
Slide 56
Automate Extract C2s using IDA AppCall(2)
•
10/1/2024 Empowering Malware Analysis with IDA AppCall Feature 56
Slide 57
Automate Extract C2s using IDA AppCall(3)
10/1/2024 Empowering Malware Analysis with IDA AppCall Feature 57
Slide 58
10/1/2024 Empowering Malware Analysis with IDA AppCall Feature 58
Slide 59
Resources
•
•
•
•
•
•
•
•
•
10/1/2024 Empowering Malware Analysis with IDA AppCall Feature 59
Slide 60
Resources
•
•
•
•
•
•
•
•
10/1/2024 Empowering Malware Analysis with IDA AppCall Feature 60
Slide 61
End…
10/1/2024 61
Tags
security bootcamp
security
empowering malware analysis
reverse
ida
appcall
malware analysis
Categories
General
Download
Download Slideshow
Get the original presentation file
Quick Actions
Embed
Share
Save
Print
Full
Report
Statistics
Views
3,340
Slides
61
Age
425 days
Related Slideshows
22
Pray For The Peace Of Jerusalem and You Will Prosper
RodolfoMoralesMarcuc
30 views
26
Don_t_Waste_Your_Life_God.....powerpoint
chalobrido8
32 views
31
VILLASUR_FACTORS_TO_CONSIDER_IN_PLATING_SALAD_10-13.pdf
JaiJai148317
30 views
14
Fertility awareness methods for women in the society
Isaiah47
29 views
35
Chapter 5 Arithmetic Functions Computer Organisation and Architecture
RitikSharma297999
26 views
5
syakira bhasa inggris (1) (1).pptx.......
ourcommunity56
28 views
View More in This Category
Embed Slideshow
Dimensions
Width (px)
Height (px)
Start Page
Which slide to start from (1-61)
Options
Auto-play slides
Show controls
Embed Code
Copy Code
Share Slideshow
Share on Social Media
Share on Facebook
Share on Twitter
Share on LinkedIn
Share via Email
Or copy link
Copy
Report Content
Reason for reporting
*
Select a reason...
Inappropriate content
Copyright violation
Spam or misleading
Offensive or hateful
Privacy violation
Other
Slide number
Leave blank if it applies to the entire slideshow
Additional details
*
Help us understand the problem better