All the strings from the executable are parsed and placed in this section. The ‘strings section’ is also a useful source of information for the analyst. Using this functionality, the malware creator can hide code inside the TLS (Thread Local Storage) that will be executed before Windows OS creates the process. This code will be executed before the entry point. The section ‘ tls-callback’ has the code that will set up the environment, so the application can run. If the malicious application has dropper5 functionalities, the files that are written on the disk could be stored in the ‘.rsrc’ section. The ‘resources section’ usually stores the information related to UI (icons or custom window elements).
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |