Reverse Engineering Malware (Part 5)

by Don Parker
Sept. 1, 2017 0 comments TechGenix windows client security

Over the course of this last part on reverse engineering we will take a look at the now unpacked piece of malware. It is at this juncture that a point or two need be mentioned about reverse engineering. There are various goals for performing reverse engineering and also various methodologies. Put simply, in our case we are doing rev eng for the purposes of analyzing malware. What we want to extract from this analysis is a better understanding of what the malware itself does, and perhaps to some extent, how it does it. One should still use both static and dynamic rev eng principles as described earlier in the series.