Tasty Malware Analysis with T.A.C.O.
Bringing Cuckoo Reports into IDA Pro Ruxcon 2015 Jason Jones
Tasty Malware Analysis with T.A.C.O. Bringing Cuckoo Reports into - - PowerPoint PPT Presentation
Tasty Malware Analysis with T.A.C.O. Bringing Cuckoo Reports into IDA Pro Ruxcon 2015 Jason Jones Who Am I? Sr. Security Research Analyst for Arbor Networks ASERT Attend AHA! in Austin semi-frequently Welcome to the
Bringing Cuckoo Reports into IDA Pro Ruxcon 2015 Jason Jones
2
– BlackHatUSA / Botconf / AusCERT / REcon
– RE automation – Malware clustering – Graph database applications to Reverse Engineering / Threat Intel
3
5
6
7
8
9
10
11
12
13
14
15
16
17
18
Caller / Parent Caller Addresses
19
20
21
22
{explorer,svchost,iexplore,etc.}.exe
23
24
25
26
27
28
29
30
31
Filterable by Category Filterable by Call / Argument value
32
33
34
35
36
37
38
39
40
41
42