×

Reversing the Gophe Spambot: Confronting COM Code and Surmounting STL Snags

Add to wishlistAdded to wishlistRemoved from wishlist 0
Add to compare+
Duration

40m

level

Intermediate

Course Creator

BSides Huntsville

Last Updated

07-Jun-21

BSides Huntsville | Reversing the Gophe Spambot: Confronting COM Code and Surmounting STL Snags | Mike Bailey

Add your review

Unobfuscated malware can still be overwhelming to analyze. Even accomplished reverse engineers may feel hand-wavey about STL and COM code. Take for example Gophe, a spambot associated with Dyre campaigns and Trickbot C2, which weighs in around 2.6 MB with a 10 KB WinMain, three embedded binaries, copious STL template-generated code, and multiple flavors of atypical COM usage. COM is 27 years old, and plugins are starting to materialize to automate its analysis, but Gophe presents a strong case for understanding COM directly and applying that knowledge to decompilation instead of assembly listings. Meanwhile, C++ reversing is well-covered, but the literature is largely orthogonal to STL code. In this talk, Michael Bailey of FireEye’s FLARE Team will share how to tame STL code with knowledge of a few key structures and how to investigate COM usage that doesn’t conform to the norm. This will include a guided tour of a Gophe sample to focus on tactics for effective STL and COM reversing by enriching decompilation in Hex-Rays. We’ll examine what Gophe is doing with Outlook.Application, Microsoft’s Messaging API (MAPI), and one other COM interface that it uses to hide from view. This reverse engineering case study is all ham and no spam, so bring your appetite!
Author Name: BSides Huntsville
Author Description:
BSides Huntsville is the conference for those that work (or would like to work) in the trenches of cybersecurity. This is the opportunity for you to engage in fierce discussions about the next big ideas or the worst product you’ve ever seen in a friendly and informal setting.

Table of Contents

  • Reversing the Gophe Spambot: Confronting COM Code and Surmounting STL Snags
    40mins

User Reviews

0.0 out of 5
0
0
0
0
0
Write a review

There are no reviews yet.

Be the first to review “Reversing the Gophe Spambot: Confronting COM Code and Surmounting STL Snags”

Your email address will not be published. Required fields are marked *

Reversing the Gophe Spambot: Confronting COM Code and Surmounting STL Snags
Reversing the Gophe Spambot: Confronting COM Code and Surmounting STL Snags
Edcroma
Logo
Compare items
  • Total (0)
Compare
0
https://login.stikeselisabethmedan.ac.id/produtcs/
https://hakim.pa-bangil.go.id/
https://lowongan.mpi-indonesia.co.id/toto-slot/
https://cctv.sikkakab.go.id/
https://hakim.pa-bangil.go.id/products/
https://penerimaan.uinbanten.ac.id/
https://ssip.undar.ac.id/
https://putusan.pta-jakarta.go.id/
https://tekno88s.com/
https://majalah4dl.com/
https://nana16.shop/
https://thamuz12.shop/
https://dprd.sumbatimurkab.go.id/slot777/
https://dprd.sumbatimurkab.go.id/
https://cctv.sikkakab.go.id/slot-777/
https://hakim.pa-kuningan.go.id/
https://hakim.pa-kuningan.go.id/slot-gacor/
https://thamuz11.shop/
https://thamuz15.shop/
https://thamuz14.shop/
https://ppdb.smtimakassar.sch.id/
https://ppdb.smtimakassar.sch.id/slot-gacor/
slot777
slot dana
majalah4d
slot thailand
slot dana
rtp slot
toto slot
slot toto
toto4d
slot gacor
slot toto
toto slot
toto4d
slot gacor
tekno88
https://lowongan.mpi-indonesia.co.id/
https://thamuz13.shop/
https://www.alpha13.shop/
https://perpustakaan.smkpgri1mejayan.sch.id/
https://perpustakaan.smkpgri1mejayan.sch.id/toto-slot/
https://nana44.shop/
https://sadps.pa-negara.go.id/
https://sadps.pa-negara.go.id/slot-777/
https://peng.pn-baturaja.go.id/
https://portalkan.undar.ac.id/
https://portalkan.undar.ac.id/toto-slot/
https://penerimaan.ieu.ac.id/
https://sid.stikesbcm.ac.id/