From the course: Ethical Hacking: The Complete Malware Analysis Process

Unlock the full course today

Join today to access over 22,600 courses taught by industry experts or purchase this course individually.

Analyzing packers

Analyzing packers

From the course: Ethical Hacking: The Complete Malware Analysis Process

Start my 1-month free trial

Analyzing packers

- [Instructor] Malware is typically prepared for delivery by running it through a software packer. Which compresses the code and may add anti sandboxing features. It then combines the compressed data with the unpacking stub into a single executable. When the pact executable is first executed the unpacking stub, unpacks and recreates the original code from the compress code before executing it. By doing this malicious code signatures can be removed and therefore defeat intrusion detection systems. And the pack code is often made more difficult to analyze. The Universal Packer for eXecutables UPX is an open source packer which can be used on both Linux and Windows. I've downloaded the Windows zip file, so let's take a look at it. But firstly, let's take a look at the simplest embler program which will be packing. Hexer with a small assembler program which displays the ASCII and hex contents of a file on the console. We…

Contents