Malware can cause a lot of damage. Writers of these programs use a variety of methods that hide their program and infect the target system. They use different obfuscation methods that make their analysis difficult. In addition, we usually do not have access to their source code. This complicates the analysis and requires more specialized knowledge. It is important to know how malware works. This can limit the spread and reduce further damage. In this thesis, we will highlight some basic methods of analysis and analyze a real obfuscated malware. We will describe static and dynamic methods of analysis and the tools that are used for each of them. We will analyze the DarkComet malware, which was obfuscated using ASProtect packer.
|