Malware analysis and detection using reverse Engineering

Page 1

ISSN 2348-1196 (print) International Journal of Computer Science and Information Technology Research ISSN 2348-120X (online) Vol. 10, Issue 2, pp: (1-4), Month: April - June 2022, Available at: www.researchpublish.com

Malware analysis and detection using reverse Engineering 1

B.Rashmitha, 2J. Alwina Beauty Angelin, 3E.R. Ramesh 1

Department of Information Security and Digital Forensics,

Dr. M.G.R. Educational and Research Institute, Chennai - 600095, Tamil Nadu, India. 2

Department of Information Security and Digital Forensics,

Dr. M.G.R. Educational and Research Institute, Chennai - 600095, Tamil Nadu, India. 3

Center of Excellence in Digital Forensics, Chennai - 600096, Tamil Nadu, India.

Abstract: The exponential growth of the internet and new technology lead today's world in a hectic situation both positive as well as the negative module. Cybercriminals gamble in the dark net using numerous techniques. This leads to cybercrime. Cyber threats like Malware attempt to infiltrate the computer or mobile device offline or internet, chat(online), and anyone can be a potential target. Malware is also known as malicious software is often used by cybercriminals to achieve their goal by tracking internet activity, capturing sensitive information, or blocking computer access. Reverse engineering is one of the best ways to prevent and is a powerful tool to keep the fight against cyber attacks. Most people in the cyber world see it as a black hat—It is said as being used to steal data and intellectual property. But when it is in the hands of cybersecurity experts, reverse engineering dons the white hat of the hero. Looking at the program from the outside in –often by a third party that had no hand in writing the code. It allows those who practice it to understand how a given program or system works when no source code is available. Reverse engineering accomplishing several tasks related to cybersecurity: finding system vulnerabilities, researching malware &analyzing the complexity of restoring core software algorithms that can further protect against theft. It is hard to hack certain software. Keywords: Malware, threat, vulnerablity, detection, reverse engineering, analysis.

1. INTRODUCTION Technology has made our lives convenient, it has also allowed a new form of crime, cyber threat. Cybercriminals can attack computers by using malware to track internet activities and capture sensitive information such as usernames and passwords from financial websites. Malicious software is any program or file that is intentionally designed to harm, infiltrate, or damage a computer, server, or computer network. This software can disable or disrupt the operation of a system, allowing hackers to gain access to confidential and sensitive information and to spy on the computer and the owner of the computer itself. Malware is specifically made to be hidden so that it can remain inside a system for a certain period without the knowledge of the system owner. Malware analysis by using the reverse engineering method becomes one solution that can be used to extract data in malware to find out how the malware is working when it attacks the system. Therefore, this study aims to perform malware analysis to know the dangers of malware and how to prevent it and protect our devices against it. In this study, a file named best.exe will be used as a malware sample to find out information about malware contained in it. In this research, we enhance investigated data analysis using a marble sample to have a brief note on the derived solution data that is extracted, which helps to give a solution by analyzing the resource data evidence. The purpose of reverse engineering is usually to duplicate or improve the functionality of the original product by detecting the solution.

Page | 1 Research Publish Journals


Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.
Malware analysis and detection using reverse Engineering by Research Publish Journals - Issuu