Version alpha

lecture: Sandbagility - Reverse Engineering Framework for Windows dynamic analysis

Hypervisor based introspection framework for Microsoft Windows for reverse engineering

Event large

There mainly three different approaches in malware reverse engineering: static, dynamic and sandboxed analysis. The last approach is the fastest way to get some information, if the malware is not designed to detect, escape or avoid sandboxes. In this case, the analyst must do some static or dynamic analysis, which can be much slower. Sandbagility is a Hypervisor based introspection framework for Microsoft Windows designed for reverse engineering. This framework was developed to offer a hybrid solution between dynamic and sandbox analysis and reduce analysis time. It was written in Python and is currently based on a [modified version of VirtualBox hypervisor](https://winbagility.github.io/). It was thought to be stealthy, adaptive and easy to use. Our presentation will use a practical study case to describe the framework. The chosen case is a well-known one, which is wannacry (not for its technical level but for educational purposes).

Info

Day: 2018-06-17
Start time: 10:30
Duration: 00:30
Room: Grand salon
Track: Software Reverse Engineering

Links:

Files

Concurrent Events