News from the Lab: Hacking the Malware– A reverse-engineer’s analysis

Monday, October 16, 2006

Hacking the Malware– A reverse-engineer’s analysis

ABSTRACT

This paper attempts to document an approach on how the hackers make use of the vulnerabilities to install malicious software on the vulnerable machine. A comprehensive reverse code engineered analysis of the malicious software (Win32.Qucan.a) and the various protection schemes against the worm by various security products are also discussed.

I hope this document will help the Malware researchers, Intrusion Analysts and other Security professionals to conduct a more viable and comprehensive research.

The complete paper can be downloaded from
http://geocities.com/rahulmohandas/hacking_the_malware.pdf

MD5: F875DADCAD00792D753CC96BD57E0F72

or

http://websamba.com/forever_rahul/hacking_the_malware.zip

MD5(zip file): 5562F1A86DDC447A14D7763FF4C8D85D

3 Comments:

At 12:31 AM, Anonymous Anonymous said...

The paper is really awesome, it truly depicts the internals of the worm...keep up your research...

 
At 11:15 PM, Anonymous Anonymous said...

you checked in on some pretty weak protection defenses -- have you checked behavioral based stuff like at www.novatix.com? what do you think of them?

 
At 3:08 AM, Anonymous Anonymous said...

good paper. interesting to see taskkill used here. post it on the offensive computing site, your geocities transfer limit is surpassed!

 

Post a Comment

<< Home