In this video, we take a simple Windows 32bits malware and reverse engineer it in IDA. We cover topics such as:
- Debugging malware with Bochs
- Self modifying code
- Using Appcall to resolve API names hashes
- Anti emulation / debugger tricks
- SEH
- HW vs Software breakpoints
- Cleaning up the unpacked binary
- Decompiling the final result
Please find the sample and clean database here:
https://github.com/allthingsida/allthingsida/tree/main/malware/01-lighty