Sept. 3, 2023, 5:42 p.m. | /u/0xd3xt3r

Computer Forensics www.reddit.com

During my journey into reverse engineering, I stumbled upon a valuable technique: partial binary emulation while dissecting the Mirai IoT Botnet. This malicious software utilized a custom algorithm to obfuscate both its configuration and all strings within it. As the malware executed, it dynamically decrypted these strings through a specific function.

As I delved deeper into the project, a thought crossed my mind: Could I decode all the obscured strings without having to run the malware itself? Was it possible …

algorithm analysis binary botnet computerforensics configuration emulation engineering function iot iot botnet journey malicious malicious software malware malware analysis mirai partial reverse reverse engineering software strings

Security Operations Program Manager

@ Microsoft | Redmond, Washington, United States

Sr. Network Security engineer

@ NXP Semiconductors | Bengaluru (Nagavara)

DevSecOps Engineer

@ RP Pro Services | Washington, District of Columbia, United States

Consultant RSSI H/F

@ Hifield | Sèvres, France

TW Senior Test Automation Engineer (Access Control & Intrusion Systems)

@ Bosch Group | Taipei, Taiwan

Cyber Security, Senior Manager

@ Triton AI Pte Ltd | Singapore, Singapore, Singapore