Reverse Engineering Analysis Statis Forensic Malware Webc2-Div

  • Waliulu R
  • Alam T
N/ACitations
Citations of this article
18Readers
Mendeley users who have this article in their library.

Abstract

At this paper focus on Malicious Software also known as Malware APT1 (Advance Persistent Threat) codename WEBC2-DIV the most variants malware has criteria consists of Virus, Worm, Trojan, Adware, Spyware, Backdoor either Rootkit. Although, malware could avoidance scanning antivirus but reverse engineering could be know how dangerous malware infect computer client. Lately, malware attack as a form espionage (cyberwar) one of the most topic on security internet, because of has massive impact. Forensic malware becomes indicator successful user to realized about malware infect. This research about reverse engineering. A few steps there are scanning, suspected  packet in network and analysis of malware behavior and disassembler body malware.

Cite

CITATION STYLE

APA

Waliulu, R. F., & Alam, T. H. I. (2019). Reverse Engineering Analysis Statis Forensic Malware Webc2-Div. Insect (Informatics and Security): Jurnal Teknik Informatika, 4(1), 15. https://doi.org/10.33506/insect.v4i1.223

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free