Reversing - .NET main is not the first thing executed

  Рет қаралды 1,082

MalwareAnalysisForHedgehogs

MalwareAnalysisForHedgehogs

Күн бұрын

Пікірлер: 11
@MalwareAnalysisForHedgehogs
@MalwareAnalysisForHedgehogs Жыл бұрын
The main() method in .NET applications is considered as the entry point. But it is not the first thing being executed, which is purposefully used to deter reverse engineers. We write Intermediate Language assembly code to find out what is actually executed before main() in a .NET assembly. Malware Analysis Course: www.udemy.com/course/windows-... Washis article: blog.washi.dev/posts/entry-po... Follow me on Twitter: twitter.com/struppigel
@trungtranbao5621
@trungtranbao5621 Жыл бұрын
Good! Thank you very much.
@Stack28x3
@Stack28x3 Жыл бұрын
excellent video, thank you very much. where can I find documents that about IL language instructions?
@MalwareAnalysisForHedgehogs
@MalwareAnalysisForHedgehogs Жыл бұрын
Thank you! I recommend the book ".NET IL Assembler". You can also use the specification but the book is easier to grasp: www.ecma-international.org/publications-and-standards/standards/ecma-335/ Karsten
@Stack28x3
@Stack28x3 Жыл бұрын
@@MalwareAnalysisForHedgehogs thanks 🤝
@hlcd-7191
@hlcd-7191 Жыл бұрын
But if someone add anti debug how i can debug the exe, or i need to bypass the anti debug first ? and how do that if the code is encryption?
@MalwareAnalysisForHedgehogs
@MalwareAnalysisForHedgehogs Жыл бұрын
Hi. Yes you will need to bypass it. It helps to learn various anti-debug techniques and understand how they work. Encrypted code is usually there because the sample is packed. You'll need to unpack it. The anti-debug can be in both, the unpacking stub of the packed sample, or the payload after unpacking. So it depends what you need to do first. But often you can unpack without using a debugger at all. For .NET samples I recommend MegaDumper. Just run the sample and then dump it with MegaDumper. Works most of the time. For native samples you can use Hasherezade's mal_unpack.
@andreasrothenhauser5352
@andreasrothenhauser5352 Жыл бұрын
Can we store the decrypted sample to disk with dnspy?
@MalwareAnalysisForHedgehogs
@MalwareAnalysisForHedgehogs Жыл бұрын
Yes, go to File -> Save Module
@SurajYadav-qb2yu
@SurajYadav-qb2yu Жыл бұрын
Do you have any malware names in mind that use this technique?
@MalwareAnalysisForHedgehogs
@MalwareAnalysisForHedgehogs Жыл бұрын
Hi. This is not tied to a malware family, but rather to usage of ConfuserEx and similar protectors which apply those modifications automatically. In ConfuserEx it is the "AntiTamper" that does this: github.com/yck1509/ConfuserEx/wiki/Anti-Tamper-Protection
Antivirus myths and how AVs actually work
16:35
MalwareAnalysisForHedgehogs
Рет қаралды 1,1 М.
How to Crack Software (Reverse Engineering)
16:16
Eric Parker
Рет қаралды 827 М.
99.9% IMPOSSIBLE
00:24
STORROR
Рет қаралды 31 МЛН
Правильный подход к детям
00:18
Beatrise
Рет қаралды 11 МЛН
Compiling C# into NATIVE code, just like Go, Rust and C++
9:05
Nick Chapsas
Рет қаралды 84 М.
If __name__ == "__main__" for Python Developers
8:47
Python Simplified
Рет қаралды 418 М.
Malware Theory - Five Unpacking Methods and a Generic Unpacking Approach
13:26
MalwareAnalysisForHedgehogs
Рет қаралды 2,8 М.
Malware Analysis - Writing x64dbg unpacking scripts
20:51
MalwareAnalysisForHedgehogs
Рет қаралды 1,7 М.
7 Design Patterns EVERY Developer Should Know
23:09
ForrestKnight
Рет қаралды 179 М.
IDA vs Binary Ninja vs Ghidra after 1.5 years using them
11:09
MalwareAnalysisForHedgehogs
Рет қаралды 5 М.
Malware Analysis - 3 ways to deobfuscate JScript and JavaScript malware
43:08
MalwareAnalysisForHedgehogs
Рет қаралды 2,8 М.