Malware Theory - Basic Structure of PE Files

  Рет қаралды 44,998

MalwareAnalysisForHedgehogs

MalwareAnalysisForHedgehogs

6 жыл бұрын

I explain the basic structure of the Portable Executable file format using animated graphics. This video is meant for beginners in malware analysis.
My malware analysis course for beginners: www.udemy.com/course/windows-...
Buy me a coffee: ko-fi.com/struppigel
Follow me on Twitter: / struppigel

Пікірлер: 41
@StephenChapman
@StephenChapman 6 жыл бұрын
Awesome video! I love the idea of heading this direction to help beginners and those with reversing experience who would like to pivot into malware RE!
@pcsecuritychannel
@pcsecuritychannel 6 жыл бұрын
Awesome video! Tablet looks great.
@mrnano1991
@mrnano1991 6 жыл бұрын
Yeah bro .. That's way better than just talk .. You are going in the right direction.
@Legendofmudkip
@Legendofmudkip 6 жыл бұрын
Awesome video, thanks for making it!
@alipants429
@alipants429 6 жыл бұрын
Looove your videoo! you're able to explain concepts extremely well for a novice. thank you, keep up the great work :) I'm starting to learn malware RE because o f your videos! :) I like how you use illustration to enforce ideas, alot easier for some to see visual representation of things!
@LearnThenTeach
@LearnThenTeach 5 жыл бұрын
Great explanations here!
@OALABS
@OALABS 6 жыл бұрын
That's really cool! I totally want one 😺😺 ... Also nice PE over view : )
@cybercdh
@cybercdh 6 жыл бұрын
Definitely agree, I want !! I learned a few things here too, nice one Karsten.
@batuhanbatuhan6445
@batuhanbatuhan6445 2 жыл бұрын
I love theory videos the most
@0x7FFFFFFFFFFF
@0x7FFFFFFFFFFF 6 жыл бұрын
Hi MW4HH, (sorry if you don't like my abbreviation :P) Do you think it is valuable to learn about PE files in great detail? For example the OpenSecurityTraining 'Life of Binaries' course has over 50 videos and goes very in depth in to the different fields within PE files. Is it possibly required learning before you can manually unpack malware?
@MalwareAnalysisForHedgehogs
@MalwareAnalysisForHedgehogs 6 жыл бұрын
Hi, :) You certainly need to learn the basics, but not every detail of it. You should understand what imports, relocations and resources are. You should also understand the basic structure and some important fields of the headers. You need to know how sections are defined and how they are mapped to memory. But you don't need to know as much as someone who wants to build a PE parser.
@gliderhnr1633
@gliderhnr1633 4 жыл бұрын
Nice video. Keep going .
@maqelepo
@maqelepo Жыл бұрын
simple simple simple str8 to the most basic point awesome
@l3n693
@l3n693 6 жыл бұрын
Good job 👍, I'm sure this will help beginners get more into malware analysis and even overall reverse engineering. Remember to make a video of IAT and EAT since it's quite hard to find resources of that(and the ones out there are a bit confusing).
@MalwareAnalysisForHedgehogs
@MalwareAnalysisForHedgehogs 6 жыл бұрын
Thanks. :) IAT & EAT: Yes, that's a good point. It is something I really struggled understanding back then.
@l3n693
@l3n693 6 жыл бұрын
MalwareAnalysisForHedgehogs Yea... IAT was a true mess, EAT I actually never messed with altho I heard that it's way easier.
@alinastechyshyn6410
@alinastechyshyn6410 5 жыл бұрын
If I want to view my exe file in hex and analyze it step by step following your video, what tool do I use for analysis?
@MalwareAnalysisForHedgehogs
@MalwareAnalysisForHedgehogs 5 жыл бұрын
Hi Alina. Any hex editor will suffice. E.g. hdx: mh-nexus.de/en/hxd/
@Vogel42
@Vogel42 6 жыл бұрын
Using a graphics tablet for illustration is a great idea.
@andyandrw
@andyandrw 6 жыл бұрын
When people talk about storing information in EOF(crypter for example), is it End of the File? Specifically where/which part of the file is it? I noticed some malware crypters preserve end of file, what is this? Thanks
@MalwareAnalysisForHedgehogs
@MalwareAnalysisForHedgehogs 6 жыл бұрын
Yes, they mean "End of File" with EOF. EOF crypters store the encrypted executable in the stub's overlay. That's quite easy for them to program because they simply append the data to the stub, most often preceeded by some kind of marker to find the start of the data again.
@abandonedmuse
@abandonedmuse 5 жыл бұрын
Wait so anything that says EOF is malware files? I have seen this in my files.
11 ай бұрын
some malwares write zeroes to end of the executable, so is there any end marker (or sth. else) to check that overlay or section ends?
@MalwareAnalysisForHedgehogs
@MalwareAnalysisForHedgehogs 11 ай бұрын
The start of the overlay is at the end of the last section. The section table tells you the start and size of the last section, so you can calculate where the last section ends. That is where the overlay starts. However, you cannot determine where the data in the overlay ends that was there before zeroes or other bloat was added to it. When dealing with bloated samples it can help to either cut off the zeroes or to pack the file with UPX. Both will likely shrink the size enough that the file can be uploaded to services like VT or automatic sandbox systems. Does this answer your question?
11 ай бұрын
@@MalwareAnalysisForHedgehogs yes, thanks for explaining!
@sleekbr7666
@sleekbr7666 2 жыл бұрын
This guy should cheer up. I mean smile bro.
@hassnainjaved7399
@hassnainjaved7399 Жыл бұрын
Kindly make another video os internals for malware
@tinym00n
@tinym00n 4 жыл бұрын
Hi do you recommend any book or online course about PE structure, thanks.
@MalwareAnalysisForHedgehogs
@MalwareAnalysisForHedgehogs 4 жыл бұрын
Sorry, I just read your comment, it seems it slipped through. The PE COFF documentation is the most important. It's not a tutorial, though. But it's how I learnt it: docs.microsoft.com/en-us/windows/win32/debug/pe-format If you write a simple PE parser, you will get the knack of it.
@D_Tech_And_Trek
@D_Tech_And_Trek 3 жыл бұрын
How MZ is at offset 0x3C? Can someone explain? I see MZ at offset 0 in hex editor..
@MalwareAnalysisForHedgehogs
@MalwareAnalysisForHedgehogs 3 жыл бұрын
e_lfanew is at offset 0x3c. Not MZ. e_lfanew points to PE\0\0
@heccerda
@heccerda 4 жыл бұрын
that's the weirdest b I've seen in my life
@tukaramgundur4659
@tukaramgundur4659 2 жыл бұрын
sir, can u explain Non-PE
@MalwareAnalysisForHedgehogs
@MalwareAnalysisForHedgehogs 2 жыл бұрын
Hi. What kind of non-PE format? There are so many.
@virozz1024
@virozz1024 3 жыл бұрын
its not magic number with dos header well these are initials of guy who written this stub , Mark Zbikowski :)
@MalwareAnalysisForHedgehogs
@MalwareAnalysisForHedgehogs 3 жыл бұрын
They are still called magic numbers. en.wikipedia.org/wiki/Magic_number_(programming)
@batuhanbatuhan6445
@batuhanbatuhan6445 2 жыл бұрын
Zero sections sounds like me
@cherifaly6757
@cherifaly6757 6 жыл бұрын
What's your mother language?
@MalwareAnalysisForHedgehogs
@MalwareAnalysisForHedgehogs 6 жыл бұрын
German
@cherifaly6757
@cherifaly6757 6 жыл бұрын
MalwareAnalysisForHedgehogs Vielen Dank für die Videos!
@MalwareAnalysisForHedgehogs
@MalwareAnalysisForHedgehogs 6 жыл бұрын
Bitteschön! :)
Malware Theory - Portable Executable Resources
8:19
MalwareAnalysisForHedgehogs
Рет қаралды 8 М.
КАК УСТРОЕН EXE ФАЙЛ?
25:38
Alek OS
Рет қаралды 304 М.
Khóa ly biệt
01:00
Đào Nguyễn Ánh - Hữu Hưng
Рет қаралды 19 МЛН
How to bring sweets anywhere 😋🍰🍫
00:32
TooTool
Рет қаралды 54 МЛН
WHO DO I LOVE MOST?
00:22
dednahype
Рет қаралды 61 МЛН
100❤️
00:20
Nonomen ノノメン
Рет қаралды 75 МЛН
This Insane Virus Trick Would Have Fooled Me - Watch Out!
7:53
Digging into Import Tables in PE Files - What is the IMAGE_IMPORT_DESCRIPTOR Structure?
24:44
Dr Josh Stroschein - The Cyber Yeti
Рет қаралды 3,3 М.
Windows PE File Format Explained
11:28
Guided Hacking
Рет қаралды 4 М.
In-depth: ELF - The Extensible & Linkable Format
19:02
stacksmashing
Рет қаралды 188 М.
why do header files even exist?
10:53
Low Level Learning
Рет қаралды 365 М.
Malware Analysis Bootcamp - Understanding The PE Header
7:33
HackerSploit
Рет қаралды 39 М.
Demystifying the PE File Format - Dominic Cunningham
25:12
No really, how does Linux run executables?
8:37
Jacob Pradels
Рет қаралды 178 М.
What are Executables? | bin 0x00
8:35
PwnFunction
Рет қаралды 184 М.
How charged your battery?
0:14
V.A. show / Магика
Рет қаралды 6 МЛН
Gizli Apple Watch Özelliği😱
0:14
Safak Novruz
Рет қаралды 2,4 МЛН
Samsung Galaxy 🔥 #shorts  #trending #youtubeshorts  #shortvideo ujjawal4u
0:10
Ujjawal4u. 120k Views . 4 hours ago
Рет қаралды 2,3 МЛН