Malware3 |
Course code: Malware-3 Hex-Ray Malware static analysis using IDAPro and WinDbg |
|
![]() ![]() ![]() ![]() |
||
Seminar name/code |
Date/time |
Overview |
Hex-Ray IDAPro and |
2 days OR 3 days |
This is a Malware reverse engineering seminar using IDA Pro and WinDbg. |
Textbook and equipment used |
Lecturer |
Purpose |
★Distribution |
|
The purpose of this course is to understand the introductory steps for static analysis of Malware, understand the movement and internal workings of Malware, and the files it generates, and be able to analyze detailed operations. Using Hex Ray's IDA Pro and WinDbg, you will learn the basics of how to use the x86 assembler and debugger, and how to track binaries. *The seminar will use actual malware for detection and analysis. It is detected as a malicious tool by many antivirus software, antimalware tools, VirusTotal, etc. Please be careful when handling capture files. (important) (Note) |
Seminar details |
||
Static analysis of Windows malware (PE32 binary) Assembler basics |
mnemocks, registers, addresses, assemble, disassemble Explanation of assembler code, branching, and commonly used methods Comparison between C language notation and assembler notation Reverse engineering analysis of Win32PE applications with disassembler and debugger |
|
Static Malware Analysis with Hex-Rays IDA Pro and WinDbg
This page keeps all original information and links. Japanese page





