Q: | 1. Compare the strings in the malware (from the output of the strings command) with the information available via dynamic analysis. Based on this
comparison, which elements might be encoded? |
Q: | 2. Use IDA Pro to look for potential encoding by searching for the string xor. What type of encoding do you find? |
Q: | 3. What is the key used for encoding and what content does it encode? |
Q: | 4. Use the static tools FindCrypt2, Krypto ANALyzer (KANAL), and the IDA Entropy Plugin to
identify any other encoding mechanisms. What do you find? |
Q: | 5. What type of encoding is used for a portion of the network traffic sent by the
malware? |
Q: | 6. Where is the Base64 function in the disassembly? |
Q: | 7. What is the maximum length of the Base64-encoded data that is sent? What is encoded? |
Q: | 8. In this malware, would you ever see the padding characters (= or ==) in the Base64-encoded data? |
Q: | 9. What does this malware do? |