Reverse Engineering Reverse Engineering Analysis Forensic Malware WEBC2-Div

Main Article Content

Raditya Faisal Waliulu

Abstract

At this paper focus on Malicious Software also known as Malware APT1 (Advance Persistent Threat) codename WEBC2-DIV the most variants malware has criteria consists of Virus, Worm, Trojan, Adware, Spyware, Backdoor either Rootkit. Although, malware could avoidance scanning antivirus but reverse engineering could be know how dangerous malware infect computer client. Lately, malware attack as a form espionage (cyberwar) one of the most topic on security internet, because of has massive impact. Forensic malware becomes indicator successful user to realized about malware infect. This research about reverse engineering. A few steps there are scanning, suspected  packet in network and analysis of malware behavior and disassembler body malware.

Article Details

How to Cite
Waliulu, R. (2018). Reverse Engineering Reverse Engineering Analysis Forensic Malware WEBC2-Div. Journal of Informatics Information System Software Engineering and Applications (INISTA), 1(1). https://doi.org/10.20895/inista.v1i1.10
Section
Articles

References

[1] G Vigna, Antivirus isn't Dead, It Just Can;t Keep Up.: Lastline Labs, 2014.
[2] D Distler, "Malware Analysis : An Introduction," Journal Of SANS Institute, 2007.
[3] Joshua.I.J., Alan.H., Chen-Ching. L dan Pavel. G Ahmed.F.S., "Towards Automated Malware Behavioral Analysis and Profiling for Digital Forensic Investigation Purposes," in 4th International Conference on Digital Forensics and Cyber Crime ICDF2C 2012, Lafayette, Indiana, USA, 2012.
[4] P., dan Grance, T Mell, "The NIST definition of cloud," U.S, 2011.
[5] E. Al., Jebril, I. H., dan Zaqaibeh, B Daoud, "Vol 1. No.2 Computer Virus Stategies and Detection Methods," in Int. J. Open Probles Compt. Math., 2 September 2008.
[6] C., Merwe, A.V.D dan Paula, k Mariana, "Secure Computing Benefits, Risk and Controls," IEEE-Information Security, p. Soutch Africa, 2011.
[7] Michael, H dan Andrew Sikroski., Practical Malware Analysis. San Fransisco, 2012.
[8] S. Y., Prayudi, Y dan Riyadi, I Syarif, "Implementation of Malware Analysis using Static and Dynamic Analysis Method," International Journal of Computer Applications, vol. 117, no. 6, pp. 11 - 15, 2015.
[9] T., Zahid, M dan Ahmad, G Mahboob, "Adopting Information Security Techniques for Cloud Computing–A Survey," in International Conference on Information Technology, Yogyakarta, 2016, pp. pp 7 - 11.
[10] A dan Opera, A Juels, "New Approached to Security and Availabilitu to Cloud COmpuing," AC<-RSA Lboratories, 2013.
[11] D dan Nandi, S Devi, "Detection of Packed Malware," in Proceeding SecurIT '12 Proceedings of the First International Conference on Security of Internet of Things, NY, 2012, pp. 22 - 26.
[12] M., Valli, C dan Woodward, A Brand, "Malware Forensics: Discovery of the Intent of Deception," Journal of Digital Forensics, Security and Law, vol. Vol 5, no. 4, pp. 31 - 42, 2010.
[13] M., Fox, A., Griffith, R., Joseph, A. D dan Katz, R Armbrust, "A view of cloud computing," in Communications of the ACM, 2010, pp. pp 50-58.
[14] M., Yegneswaran, V., Saidi, H., Porras, P dan Lee, W Sharif, Eureka: A Framework for Enabling Static Malware Analysis. Berlin, Heidelberg: Springer, 2008, pp. 481-500.
[15] K dan Moon, B-R Kim, "Malware detection based on dependency graph," in in: Proceedings of the 12th annual conference on Genetic and evolutionary computation, NY, USA, 2010, pp. 12-18.
[16] S., Zheng, N., Xu, J., Xu, M dan Zhang, H Shang, "Detecting malware variants via function-call graph similarity," in in: 5th International Conference on Malicious and Unwanted, Nancy, France, October 19–20, 2010, pp. 113-120.
[17] M Davis, S Bodmer, and A Lemasters, Hacking Exposed Malware and Rootkits.: McGraw-Hill, Inc, 2010.
[18] H and Lee Jeong K, "Code graph for malware detection, in:Information Networking," ICOIN (International Conference), pp. 1-5, 2008.
[19] Waliulu Faisal Raditya, "RANCANG BANGUN APLIKASI UNTUK MENYERANG BALIK DARI PENGGUNA NETCUT DIJARINGAN LOCAL DENGAN MENGGUNAKAN DDOS," Skripsi, Fakultas Ilmu Komputer., 2013.