Book Image

Windows Malware Analysis Essentials

By : Victor Marak
Book Image

Windows Malware Analysis Essentials

By: Victor Marak

Overview of this book

Table of Contents (13 chapters)

Byte code decompilers


Malware does not discriminate and makes an effort to infect any platform or technology of choice in order to achieve its goal. In terms of malicious vectors, even .NET, Java jar executable files, Visual Basic executables (P-Code and Native Code), as well as Delphi executables, are all very well utilized for many kinds of malware.

VB code is particularly well used for thwarting reverse engineering as all the calls begin with a single point of contact – the visual basic runtime dll. Additionally, VB comes in two flavors – P code or pseudo code can be analyzed and source code decompiled to a degree. Native code presents familiar problems in decompilation technology and only analysis is a realistic expectation and not full source code analysis. https://www.vb-decompiler.org/ is the best VB decompiler as of now.

.NET files is a relatively well-researched and documented technology and a bevy of decompilers exist for this. The source code can be recompiled straight from the...