Claim Missing Document
Check
Articles

Found 2 Documents
Search
Journal : Insect (Informatics and Security): Jurnal Teknik Informatika

Reverse Engineering Analysis Statis Forensic Malware Webc2-Div Waliulu, Raditya Faisal; Alam, Teguh Hidayat Iskandar
Insect (Informatics and Security): Jurnal Teknik Informatika Vol 4, No 1 (2018): Oktober 2018
Publisher : Universitas Muhammadiyah Sorong

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (958.6 KB) | DOI: 10.33506/insect.v4i1.223

Abstract

At this paper focus on Malicious Software also known as Malware APT1 (Advance Persistent Threat) codename WEBC2-DIV the most variants malware has criteria consists of Virus, Worm, Trojan, Adware, Spyware, Backdoor either Rootkit. Although, malware could avoidance scanning antivirus but reverse engineering could be know how dangerous malware infect computer client. Lately, malware attack as a form espionage (cyberwar) one of the most topic on security internet, because of has massive impact. Forensic malware becomes indicator successful user to realized about malware infect. This research about reverse engineering. A few steps there are scanning, suspected  packet in network and analysis of malware behavior and disassembler body malware.
Reverse Engineering Analysis Statis Forensic Malware Webc2-Div Raditya Faisal Waliulu; Teguh Hidayat Iskandar Alam
Insect (Informatics and Security): Jurnal Teknik Informatika Vol. 4 No. 1 (2018): Oktober 2018
Publisher : Universitas Muhammadiyah Sorong

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.33506/insect.v4i1.223

Abstract

At this paper focus on Malicious Software also known as Malware APT1 (Advance Persistent Threat) codename WEBC2-DIV the most variants malware has criteria consists of Virus, Worm, Trojan, Adware, Spyware, Backdoor either Rootkit. Although, malware could avoidance scanning antivirus but reverse engineering could be know how dangerous malware infect computer client. Lately, malware attack as a form espionage (cyberwar) one of the most topic on security internet, because of has massive impact. Forensic malware becomes indicator successful user to realized about malware infect. This research about reverse engineering. A few steps there are scanning, suspected  packet in network and analysis of malware behavior and disassembler body malware.