Feb. 21, 2024, 7:06 p.m. | MalBot

Malware Analysis, News and Indicators - Latest topics malware.news

Previously, we discussed a situation where the decompiler wrongly used a combined stack slot for two separate variables. We could solve it because each variable had a distinct stack location, so editing the stack frame to split them worked.


However, modern optimizing compilers can actually reuse the same stack location for different variables active at different times (e.g. in different scopes). Consider this example:


int __fastcall getval(char a1)
{
int v2; // [esp+0h] [ebp-4h] BYREF

if ( a1 )

{ …

can compilers decompiler editing handling location malware analysis reuse stack variable week

CyberSOC Technical Lead

@ Integrity360 | Sandyford, Dublin, Ireland

Cyber Security Strategy Consultant

@ Capco | New York City

Cyber Security Senior Consultant

@ Capco | Chicago, IL

Sr. Product Manager

@ MixMode | Remote, US

Corporate Intern - Information Security (Year Round)

@ Associated Bank | US WI Remote

Senior Offensive Security Engineer

@ CoStar Group | US-DC Washington, DC