The Art of Mac Malware by Patrick Wardle
Author:Patrick Wardle [Patrick Wardle]
Language: eng
Format: epub, pdf
Publisher: No Starch Press
Published: 2022-06-13T16:00:00+00:00
Control Flow Disassembly
So far, our analysis has focused on the logic contained solely within functions, not on the interactions of the functions and the code that invokes them. Understanding such interactions is important when analyzing malware, as malicious code will often take decisive actions based on the return value of a single function. Komplexâs payload provides an illustrative example.
Komplexâs persistent payload contains logic in a function named __Z19connectedToInternetv (which demangles to connectedToInternet). This aptly named function checks if an infected host is connected to the internet. If the host is offline, the malware will understandably wait until network connectivity is restored before attempting to connect to its command and control server for tasking. (This check also doubles as a basic anti-analysis mechanism, based on the assumption that most analysis systems are not connected to the internet.)
Letâs examine the disassembly of malware code that invokes the connectedToInternet function and then acts upon its response (Listing 6-13).
0x0000000100005b15:
0x0000000100005b15 call connectedToInternet()
0x0000000100005b1a and al, 0x1
0x0000000100005b1c mov byte [rbp+var_19], al
0x0000000100005b1f test byte [rbp+var_19], 0x1
1 0x0000000100005b23 jz loc_100005b2e
2 0x0000000100005b29 jmp loc_100005b40
Download
This site does not store any files on its server. We only index and link to content provided by other sites. Please contact the content providers to delete copyright contents if any and email us, we'll remove relevant links or contents immediately.
Exploring Deepfakes by Bryan Lyon and Matt Tora(7708)
Robo-Advisor with Python by Aki Ranin(7606)
Offensive Shellcode from Scratch by Rishalin Pillay(6094)
Microsoft 365 and SharePoint Online Cookbook by Gaurav Mahajan Sudeep Ghatak Nate Chamberlain Scott Brewster(5003)
Ego Is the Enemy by Ryan Holiday(4954)
Management Strategies for the Cloud Revolution: How Cloud Computing Is Transforming Business and Why You Can't Afford to Be Left Behind by Charles Babcock(4438)
Python for ArcGIS Pro by Silas Toms Bill Parker(4173)
Elevating React Web Development with Gatsby by Samuel Larsen-Disney(3875)
Machine Learning at Scale with H2O by Gregory Keys | David Whiting(3611)
Learning C# by Developing Games with Unity 2021 by Harrison Ferrone(3284)
Speed Up Your Python with Rust by Maxwell Flitton(3231)
Liar's Poker by Michael Lewis(3220)
OPNsense Beginner to Professional by Julio Cesar Bueno de Camargo(3195)
Extreme DAX by Michiel Rozema & Henk Vlootman(3169)
Agile Security Operations by Hinne Hettema(3122)
Linux Command Line and Shell Scripting Techniques by Vedran Dakic and Jasmin Redzepagic(3108)
Essential Cryptography for JavaScript Developers by Alessandro Segala(3081)
Cryptography Algorithms by Massimo Bertaccini(3001)
AI-Powered Commerce by Andy Pandharikar & Frederik Bussler(2981)
