February 2012
Intermediate to advanced
800 pages
23h 55m
English
Two strings appear in the beacon that are not present in the malware. (When the strings command is run, the strings are not output.) One is the domain,
www.practicalmalwareanalysis.com. The other is the GET request path, which may look something like aG9zdG5hbWUtZm9v.
The xor instruction at 004011B8 leads to a single-byte
XOR-encoding loop in sub_401190.
The single-byte XOR encoding uses the byte 0x3B. The raw
data resource with index 101 is an XOR-encoded buffer that decodes to www.practicalmalwareanalysis.com.
The PEiD KANAL plug-in and the IDA Entropy Plugin can identify the use of the standard Base64 encoding string:
ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789+/
Standard Base64 encoding is used ...