
Reverse Engineering Reverse Engineering Analysis Forensic Malware WEBC2-Div
Author(s) -
Raditya Faisal Waliulu
Publication year - 2018
Publication title -
journal of informatics, information system, software engineering and applications
Language(s) - English
Resource type - Journals
ISSN - 2622-8106
DOI - 10.20895/inista.v1i1.10
Subject(s) - malware , reverse engineering , trojan , computer security , cryptovirology , backdoor , computer science , hacker , malware analysis , botnet , obfuscation , ransomware , social engineering (security) , rootkit , computer virus , the internet , world wide web , operating system
At this paper focus on Malicious Software also known as Malware APT1 (Advance Persistent Threat) codename WEBC2-DIV the most variants malware has criteria consists of Virus, Worm, Trojan, Adware, Spyware, Backdoor either Rootkit. Although, malware could avoidance scanning antivirus but reverse engineering could be know how dangerous malware infect computer client. Lately, malware attack as a form espionage (cyberwar) one of the most topic on security internet, because of has massive impact. Forensic malware becomes indicator successful user to realized about malware infect. This research about reverse engineering. A few steps there are scanning, suspected packet in network and analysis of malware behavior and disassembler body malware.