June 2022
Intermediate to advanced
328 pages
9h 1m
English
In the previous chapters, we discussed methods of static analysis used to examine files without actually running them. Often, however, it may be more efficient to simply execute a malicious file to passively observe its behavior and actions. This is especially true when malware authors have implemented mechanisms designed specifically to complicate or even thwart static analysis, such as encrypting embedded strings and configuration information or dynamically loading more code at runtime.
WindTail provides an illustrative example. The addresses of its command and control servers (generally something a malware analyst ...