• Home
  • Blog
  • ida-volatilaty- memory forensics

ida-volatilaty- memory forensics

0 comments

Requirements

Complete the following by writing a thorough report on the actions you took and the assumptions you made. 


You are a Malware Investigator at 0xC0ff33, Inc and an incident responder came across injected shellcode during an investigation. He has done all he can in IDA and has passed on the .idb file to you. Figure out what the purpose of the malware was and how it achieved its goals. 

The IDA Database file and Python script for ROR13 are located here.

Lab will be graded on the following criteria 

  • Discovered what API functions were used
  • Discovered how the API functions were resolved and what hash cipher was used
  • What the malware created on the system 
  • How the malware traversed the PEB 
  • How the malware traversed the PE 

I am looking for an analysis of the shellcode and the way that it parsed the PE and PEB structures we discussed to achieve its goal. 

Hint: I only used functions from kernel32.dll

 


if you know how to do it talk to me i already done more than half of it i just need little help

 

About the Author

Follow me


{"email":"Email address invalid","url":"Website address invalid","required":"Required field missing"}