gg

EasyMalware Reverse Engineering

Overview

Our forensics team found an audio file that could contain important data. Can you recover it?

Lab Details

Prerequisites & Requirements

  • Fundamental x64 Assembly Comprehension: A basic understanding of x64 assembly language, including common instructions, registers, and function call conventions.
  • Familiarity with Disassemblers: Experience navigating and interpreting code within disassemblers like IDA Pro.
  • Basic Understanding of Audio Processing (Optional but helpful): A conceptual grasp of how data can be represented and embedded within audio signals.

What will you learn?

  • Analyze Unknown Executables: Gain practical experience in reverse engineering an unknown executable to identify its core functionality and external library dependencies.
  • Understand GGWave Technology: Comprehend the principles behind GGWave, a library designed for data communication via sound, and its application in covert data transfer.
  • Recover Data from Audio Signals: Develop skills in extracting and decoding hidden information embedded within audio files using both specialized tools and custom scripting.

Tools

  • IDA Pro: A powerful disassembler and decompiler for in-depth static analysis of the ELF64 executable.
  • Detect-It-Easy (DIE): A utility for quickly identifying file types and their characteristics.

Job Positions

Malware Analyst

Tags

AssemblyIda ProDisassemblerStatic AnalysisSteganography