Monday, December 5, 2022

Malware Disassembling - An Art!!!

Malware Analysis

 Malware analysis is an art performed by an artist called a malware analyst or malware researcher. In the course of malware analysis, there are two main branches: Static analysis and Dynamic analysis. In this article, we are going to explain malware disassembling and the steps involved.

Malware Disassembling

Disassembling malware is a complex process that should only be performed by someone with experience in cybersecurity. Here are the general steps for disassembling malware:

  • Obtain a copy of the malware: In order to disassemble the malware, you must first obtain a copy of it. This can be done by downloading the malware from the internet or acquiring it from an infected device.
  • Use a disassembler tool: There are various disassembler tools available that can be used to disassemble malware. Some examples include IDA Pro, OllyDbg, and Radare2.
  • Load the malware into the disassembler: Once you have the disassembler tool installed, you can load the malware into the disassembler.
  • Analyze the disassembled code: The disassembler will display the malware's code in a format that is easier to read and understand. You can then carefully analyze the code to identify its functions and behavior.
  • Reverse engineer the malware: In order to understand how the malware works, you may need to reverse engineer it. This involves analyzing the code and identifying the different components of the malware, such as its payload, command and control servers, and any other components that are involved in its operation.
  • Create a report: Once you have completed your analysis, you can create a report that documents your findings. This report can be used to help others understand malware's behaviour and to develop countermeasures to protect against it.


It is important to note that disassembling malware is a complex and time-consuming process. It requires a deep understanding of cybersecurity, as well as the ability to read and understand code. As such, it is not recommended for inexperienced individuals to attempt to disassemble malware.

No comments:

Operating system - Part 1:

 In our blog, we published several articles on OS concepts which mostly on the perspective for malware analysis/security research. In few in...