03-02-2021, 07:42 PM
Hello all, hoping someone can let me know if there's anything I can do to even slightly decompile and understand the code.
Without getting too much into it, I'm attempting to examine a malicious program and figure out as much about it as possible. I know it gathers a ridiculous amount of data and opens lots of network connections, presumably sending my data somewhere. Ive hit a dead end with as much as I can learn without viewing the code. I know its probably impossible, but I'd like to try. It's apperently compiled in a way that makes it diffucult to decompile, but I'm wondering if some of the junk they left behind might let me decompile it.
Heres what I found:
Without getting too much into it, I'm attempting to examine a malicious program and figure out as much about it as possible. I know it gathers a ridiculous amount of data and opens lots of network connections, presumably sending my data somewhere. Ive hit a dead end with as much as I can learn without viewing the code. I know its probably impossible, but I'd like to try. It's apperently compiled in a way that makes it diffucult to decompile, but I'm wondering if some of the junk they left behind might let me decompile it.
Heres what I found: