News from the Lab: Hacking the Malware– A reverse-engineer’s analysis

Monday, October 16, 2006

Hacking the Malware– A reverse-engineer’s analysis


This paper attempts to document an approach on how the hackers make use of the vulnerabilities to install malicious software on the vulnerable machine. A comprehensive reverse code engineered analysis of the malicious software (Win32.Qucan.a) and the various protection schemes against the worm by various security products are also discussed.

I hope this document will help the Malware researchers, Intrusion Analysts and other Security professionals to conduct a more viable and comprehensive research.

The complete paper can be downloaded from

MD5: F875DADCAD00792D753CC96BD57E0F72


MD5(zip file): 5562F1A86DDC447A14D7763FF4C8D85D


At 12:31 AM, Anonymous Anonymous said...

The paper is really awesome, it truly depicts the internals of the worm...keep up your research...

At 11:15 PM, Anonymous Anonymous said...

you checked in on some pretty weak protection defenses -- have you checked behavioral based stuff like at what do you think of them?

At 3:08 AM, Anonymous Anonymous said...

good paper. interesting to see taskkill used here. post it on the offensive computing site, your geocities transfer limit is surpassed!


Post a Comment

<< Home