lab5
lab5
AND DETECTION
LAB 5
FILE IDENTIFICATION
Lab Objective:
Learn about:
*Hashing
*File Signature
*PEstudio
Lab tools
• Hex Editor
https://mh-nexus.de/en/hxd/
• Pestudio
https://www.winitor.com/download
HASHING
Malware writers often use packing or obfuscation to make their files more difficult to
detect or analyze. Obfuscated programs are ones whose execution the malware author has
attempted to hide. Packed programs are a subset of obfuscated programs in which the
malicious program is compressed and cannot be analyzed. Both techniques will severely
limit your attempts to statically analyze the malware
Portable Executable File Format
So far, we have discussed tools that scan executables without regard to their
format. However, the format of a file can reveal a lot about the program’s
functionality. The Portable Executable (PE) file format is used by Windows
executables, object code, and DLLs. The PE file format is a data structure that
contains the information necessary for the Windows OS loader to manage the
wrapped executable code. Nearly every file with executable code that is loaded
by Windows is in the PE file format, though some legacy file formats do appear
on rare occasion in malware.
PE files begin with a header that includes information about the code, the type
of application, required library functions, and space requirements. The
information in the PE header is of great value to the malware analyst.
PE HEADER SUMMARY
The PE header contains useful information for the malware analyst,
and we will continue to examine it in subsequent chapters. Table 1-7
reviews the key information that can be obtained from a PE header.
Pestudio
Hex Editor and Disk Editor