Reverse Engineering Analysis Forensic Malware WEBC2-DIV


  • Raditya Faisal Waliulu Universitas Muhammadiyah Sorong
  • Teguh Hidayat Iskandar Alam Universitas Muhammadiyah Sorong


forensic malware, Analysis, Advance Presistent Threat, Cyberwar, disassembler, static analysis, dynamic analysis


At this paper focus on Malicous Software also known as Malware APT1 (Advance Presistent Threat) codename WEBC2-DIV the most variants malware has criteria consists of Virus, Worm, Trojan, Adware, Spyware, Backdoor either Rootkit. Although, malware could avoidance scanning antivirus but reverse engineering could be know how dangerous malware infect computer client. Lately, malware attack as a form espionage (cyberwar) one of the most topic on security internet, because of has massive impact. Forensic malware becomes indicator sucessfull user to relized about malware infect. This research about reverse engineering. A few steps there are scanning, suspected  packet in network and analysis of malware behavior and dissambler body malware.

GS Cited Analysis


Download data is not yet available.


Crossmark Updates

How to Cite

Waliulu, R. F., & Iskandar Alam, T. H. (2018). Reverse Engineering Analysis Forensic Malware WEBC2-DIV. Sinkron : Jurnal Dan Penelitian Teknik Informatika, 3(1), 113-119. Retrieved from