Brief explanation to malware concepts

Ακυρώθηκε Αναρτήθηκε Dec 15, 2015 Πληρώθηκε κατά την παράδοση
Ακυρώθηκε Πληρώθηκε κατά την παράδοση

I am learning malware analysis and need someone to explain three scenarios. Looking for very quick bid (within a couple of hours). Just a couple of brief paragraphs for each will do, enough for me to began understanding it.

The scenarios are:

1) You examine a piece of malware and find that it's only using a few API calls and has an additional memory segment allocated in the binary with virtual memory allocated but no raw data on disk for the section.

What might this mean and how might you proceed to analyze the sample?

2) You receive a malicious binary you want to investigate. When you look at the strings contained within the malware binary, nothing seems to be readable.

What things could this mean, and how might you investigate further?

3) While analyzing a sample, you realize it has a requirement for a password to be present in a file before executing. The code is heavily obfuscated and reversing the process to compare the password would take too much time.

How can you bypass the password checking requirement to analyze the malware?

Ασφάλεια Υπολογιστή Αρχιτεκτονική Λογισμικού

Ταυτότητα Εργασίας: #9130546

Σχετικά με την εργασία

1 πρόταση Απομακρυσμένη εργασία Ενεργό Dec 16, 2015