Sept. 3, 2023, 5:33 p.m. | /u/0xd3xt3r

cybersecurity www.reddit.com

During my journey into reverse engineering, I stumbled upon a valuable technique: partial binary emulation while dissecting the Mirai IoT Botnet. This malicious software utilized a custom algorithm to obfuscate both its configuration and all strings within it. As the malware executed, it dynamically decrypted these strings through a specific function.

As I delved deeper into the project, a thought crossed my mind: Could I decode all the obscured strings without having to run the malware itself? Was it possible …

algorithm analysis binary botnet configuration cybersecurity emulation engineering function iot iot botnet journey malicious malicious software malware malware analysis mirai partial reverse reverse engineering software strings

CyberSOC Technical Lead

@ Integrity360 | Sandyford, Dublin, Ireland

Cyber Security Strategy Consultant

@ Capco | New York City

Cyber Security Senior Consultant

@ Capco | Chicago, IL

Sr. Product Manager

@ MixMode | Remote, US

Corporate Intern - Information Security (Year Round)

@ Associated Bank | US WI Remote

Senior Offensive Security Engineer

@ CoStar Group | US-DC Washington, DC