0% found this document useful (0 votes)
7 views8 pages

Report Template

Uploaded by

Aim More
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
7 views8 pages

Report Template

Uploaded by

Aim More
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 8

CA2-BYOD.

exe
Abhash Mandal, 12102865, K21CS
---------------------------------------------------------------------
-
Static Analysis Findings
- MD5 Hash

- Interesting Strings

-
- Packed/Unpacked
It’s an Unpacked Malware.

Low Entropy (i.e. >7 and sections of the malware are all available)

No packer detected in DIE


- Any other finding
Dynamic Analysis Findings
Perform Dynamic analysis and add screenshots
Code Analysis Findings
Execution flow

!. Opend the sample in IDA


2. The required “mazzedar” function name were visible in the function’s
column

3. the main function calls, checks for internet connection

4. Found the dropper function

5. Found Anti-VM check Fucntion call


6. The Anti-VM checks for the Size of Ram and No. of Processors
Debugging and Patching
Patches applied.

Dynamic Analysis Findings (Part 2)


Findingsß
Hmm..! Patched Worked.. HEHE!

You might also like