Visible to the public Investigation Malware Analysis Depend on Reverse Engineering Using IDAPro

TitleInvestigation Malware Analysis Depend on Reverse Engineering Using IDAPro
Publication TypeConference Paper
Year of Publication2022
AuthorsIsmael, Maher F., Thanoon, Karam H.
Conference Name2022 8th International Conference on Contemporary Information Technology and Mathematics (ICCITM)
Keywordsdisassembler, feature extraction, Human Behavior, IDAPro, Malware, malware analysis, Metrics, privacy, pubcrawl, resilience, Resiliency, reverse engineering, social networking (online), source coding, static analysis, Trojan malware analysis, unsolicited e-mail
AbstractAny software that runs malicious payloads on victims' computers is referred to as malware. It is an increasing threat that costs people, businesses, and organizations a lot of money. Attacks on security have developed significantly in recent years. Malware may infiltrate both offline and online media, like: chat, SMS, and spam (email, or social media), because it has a built-in defensive mechanism and may conceal itself from antivirus software or even corrupt it. As a result, there is an urgent need to detect and prevent malware before it damages critical assets around the world. In fact, there are lots of different techniques and tools used to combat versus malware. In this paper, the malware samples were analyzing in the Virtual Box environment using in-depth analysis based on reverse engineering using advanced static malware analysis techniques. The results Obtained from malware analysis which represent a set of valuable information, all anti-malware and anti-virus program companies need for in order to update their products.
DOI10.1109/ICCITM56309.2022.10031698
Citation Keyismael_investigation_2022