Computer Security: Identifying Malicious Patterns
Computer Security: Identifying Malicious Patterns
• Dynamic Analysis:
• involves running the malware and examining it.
• We can either:
• Compare the hash with the hash of the original file (if available)
• Search the hash online to see if it has already been identified
• Example Use:
D:\>upx -d PackedProgram.exe
Botnet
Downloader
Information-Stealing Malware
Launcher
Rootkit
Spam-Sending Malware