Malware Analysis: Identifying and Defeating Code Obfuscation

Malware Analysis: Identifying and Defeating Code Obfuscation
Malware Analysis: Identifying and Defeating Code Obfuscation

English | MP4 | AVC 1280×720 | AAC 44KHz 2ch | 2h 22m | 275 MB
eLearning | Skill level: Intermediate


Malware authors routinely utilize obfuscation techniques to complicate the analysis of their code. This course will teach you techniques for identifying and defeating code obfuscation so that key characteristics and behaviors can be identified.

Malware authors will routinely utilize obfuscation techniques to complicate the analysis of their code. These techniques can prevent the discovery of important indicators of compromise and limit the ability to determine malware functionality. In this course, Malware Analysis: Identifying and Defeating Code Obfuscation, you will gain the skills necessary to not only identify prevalent obfuscation techniques but also how to effectively defeat them. First, you will see how obfuscation will affect your analysis and effective strategies for defeating a variety of obfuscation methods. Next, you will explore how to identify and detect obfuscation techniques in interpreted code. This includes software routinely abused by malware authors such as Powershell and Visual Basic for Applications. You will next be able to expand your skills by learning about code obfuscation in native code. Finally, you will discover how malware authors use cryptography for obfuscation and ways to detect it. Each module of this course will include detailed demonstrations and hands-on labs that will allow you to analyze real-world malware. You will be going deep into malware obfuscation techniques with such tools as IDA Pro and WinDbg. By the end of this course, you will have the knowledge and skills to effectively tackle obfuscation!

+ Table of Contents

Course Overview
1 Course Overview

How Obfuscation Affects Your Analysis
2 Module Introduction
3 Understanding Code Obfuscation
4 How Obfuscation Impacts Analysis
5 What You Should Know
6 Conclusion

Detecting and Defeating Code Obfuscation in Interpreted Code
7 Module Introduction
8 Prevalent Obfuscation Techniques
9 Obfuscation in Visual Basic for Applications (VBA)
10 Demo – Defeating VBA Obfuscation
11 Obfuscation in PowerShell
12 Demo – Defeating PowerShell Obfuscation
13 Lab – Performing Comprehensive Analysis
14 Conclusion

Detecting and Defeating String Obfuscation in Native Code
15 Module Introduction
16 Differences from Interpreted Code
17 String Obfuscation
18 Demo – Identifying String Obfuscation
19 Lab – Defeating String Obfuscation
20 Conclusion

Detecting and Defeating Function Obfuscation in Native Code
21 Module Introduction
22 Constructing an Import Table
23 Walking the PEB, Parsing a PE
24 Demo – Dynamic API Resolution
25 Lab – Tracing Import Table Construction
26 Conclusion

Identifying Malware Use of Cryptography
27 Module Introduction
28 Purpose of Cryptography in Malware
29 Tools to Help Identify Use of Cryptography
30 Demo – Finding Cryptography
31 Lab – Analyzing Malware That Uses Cryptography
32 Conclusion

Leveling up Your Skills
33 Module Introduction
34 What You Learned
35 Leveling up Your Skills
36 Conclusion