Q: | 1. What are the exports for this DLL malware? |
Q: | 2. What happens after you attempt to install this malware using
rundll32.exe? |
Q: | 3. Where must Lab11-02.ini reside in order for the malware to install
properly? |
Q: | 4. How is this malware installed for persistence? |
Q: | 5. What user-space rootkit technique does this malware employ? |
Q: | 6. What does the hooking code do? |
Q: | 7. Which process(es) does this malware attack and why? |
Q: | 8. What is the significance of the .ini file? |
Q: | 9. How can you dynamically capture this malware’s activity with Wireshark? |