• DocumentCode
    647237
  • Title

    PsybOt malware: A step-by-step decompilation case study

  • Author

    Durfina, Lukas ; Kroustek, Jakub ; Zemek, Petr

  • Author_Institution
    IT4Innovations Centre of Excellence, Brno Univ. of Technol., Brno, Czech Republic
  • fYear
    2013
  • fDate
    14-17 Oct. 2013
  • Firstpage
    449
  • Lastpage
    456
  • Abstract
    Decompilation (i.e. reverse compilation) represents one of the most toughest and challenging tasks in reverse engineering. Even more difficult task is the decompilation of malware because it typically does not follow standard application binary interface conventions, has stripped symbols, is obfuscated, and can contain polymorphic code. Moreover, in the recent years, there is a rapid expansion of various smart devices, running different types of operating systems on many types of processors, and malware targeting these platforms. These facts, combined with the boundedness of standard decompilation tools to a particular platform, imply that a considerable amount of effort is needed when decompiling malware for such a diversity of platforms. This is an experience paper reporting the decompilation of a real-world malware. We give a step-by-step case study of decompiling a MIPS worm called psyb0t by using a retargetable decompiler that is being developed within the Lissom project. First, we describe the decompiler in detail. Then, we present the case study. After that, we analyse the results obtained during the decompilation and present our personal experience. The paper is concluded by discussing future research possibilities.
  • Keywords
    invasive software; program compilers; reverse engineering; Lissom project; application binary interface; operating systems; polymorphic code; psybot malware decompilation; retargetable decompiler; reverse compilation; reverse engineering; step-by-step decompilation; Delays; Geophysical measurement techniques; Ground penetrating radar; Malware; Program processors; Registers; Standards; Lissom; Reverse engineering; decompilation; experience; malware; psyb0t; retargetable decompiler;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Reverse Engineering (WCRE), 2013 20th Working Conference on
  • Conference_Location
    Koblenz
  • Type

    conf

  • DOI
    10.1109/WCRE.2013.6671321
  • Filename
    6671321