_strrchr
. OllyDbg missed this due to the lack of symbol support. If we load the binary into IDA Pro, we can let IDA Pro use its FLIRT signature detection to correctly identify these APIs, as shown as shown at ❷.main
function, and repeat the process again. We can use Netcat and ApateDNS to fool the malware into connecting back to an IP we control.If we step-into the function call made at 0x4013a9 (step-into 0x401000), we see two function calls to 0x4013E0. Again, this is another example where OllyDbg does not identify a system call of memset
, whereas IDA Pro does identify the function. Next, we see a call to CreateProcessA
at 0x40106E, as shown in . Before the call, some structure is being populated. We’ll turn to IDA Pro to shed some light on what’s going on here.