Reverse Engineering Analysis Forensic Malware WEBC2-DIV

Main Article Content

Raditya Faisal Waliulu Teguh Hidayat Iskandar Alam
Corresponding Author:
Raditya Faisal Waliulu |

Copyright (C):
Raditya Faisal Waliulu, Teguh Hidayat Iskandar Alam


At this paper focus on Malicous Software also known as Malware APT1 (Advance Presistent Threat) codename WEBC2-DIV the most variants malware has criteria consists of Virus, Worm, Trojan, Adware, Spyware, Backdoor either Rootkit. Although, malware could avoidance scanning antivirus but reverse engineering could be know how dangerous malware infect computer client. Lately, malware attack as a form espionage (cyberwar) one of the most topic on security internet, because of has massive impact. Forensic malware becomes indicator sucessfull user to relized about malware infect. This research about reverse engineering. A few steps there are scanning, suspected  packet in network and analysis of malware behavior and dissambler body malware.

Keyword: forensic malware, Analysis, Advance Presistent Threat, Cyberwar, disassembler, static analysis, dynamic analysis


Download data is not yet available.

Article Details

How to Cite
WALIULU, Raditya Faisal; ISKANDAR ALAM, Teguh Hidayat. Reverse Engineering Analysis Forensic Malware WEBC2-DIV. SinkrOn, [S.l.], v. 3, n. 1, p. 113-119, sep. 2018. ISSN 2541-2019. Available at: <>. Date accessed: 06 aug. 2020.
* Abstract viewed = 259 times PDF downloaded = 134 times *