Reverse Engineering Analysis Forensic Malware WEBC2-DIV

Authors

  • Raditya Faisal Waliulu Universitas Muhammadiyah Sorong
  • Teguh Hidayat Iskandar Alam Universitas Muhammadiyah Sorong

Keywords:

forensic malware, Analysis, Advance Presistent Threat, Cyberwar, disassembler, static analysis, dynamic analysis

Abstract

At this paper focus on Malicous Software also known as Malware APT1 (Advance Presistent Threat) codename WEBC2-DIV the most variants malware has criteria consists of Virus, Worm, Trojan, Adware, Spyware, Backdoor either Rootkit. Although, malware could avoidance scanning antivirus but reverse engineering could be know how dangerous malware infect computer client. Lately, malware attack as a form espionage (cyberwar) one of the most topic on security internet, because of has massive impact. Forensic malware becomes indicator sucessfull user to relized about malware infect. This research about reverse engineering. A few steps there are scanning, suspected  packet in network and analysis of malware behavior and dissambler body malware.

GS Cited Analysis

Downloads

Download data is not yet available.

Downloads


Crossmark Updates

How to Cite

Waliulu, R. F., & Iskandar Alam, T. H. (2018). Reverse Engineering Analysis Forensic Malware WEBC2-DIV. Sinkron : Jurnal Dan Penelitian Teknik Informatika, 3(1), 113-119. Retrieved from https://jurnal.polgan.ac.id/index.php/sinkron/article/view/168