mirror of
https://github.com/aljazceru/securedorg.github.io.git
synced 2025-12-19 07:04:20 +01:00
Two chars MZ are represented by two bytes not one
Two chars “MZ” are represented by two bytes not one. Thanks for tutorial, please keep going!
This commit is contained in:
@@ -26,7 +26,7 @@ This checklist should get you started:
|
||||
|
||||
---
|
||||
|
||||
## Download the Unknown Malware
|
||||
## Download the Unknown Malware
|
||||
|
||||
[**HERE**](https://drive.google.com/open?id=0B_0DJl2kuzoNRTEtQmx0SjJYZXc)
|
||||
|
||||
@@ -91,7 +91,7 @@ You can use the **Malware Analysis Report** template [HERE](https://securedorg.g
|
||||
1. Run the Victim VM
|
||||
2. Copy over the unknown file
|
||||
3. Check the file header by opening the file in the hex editor **HxD**
|
||||
* Notice the first 1 byte is **MZ** meaning it's a PE Binary
|
||||
* Notice the first 2 bytes are **MZ** meaning it's a PE Binary
|
||||

|
||||
4. Add the file extension **.exe** to the **Unknown** file so that it reads as **Unknown.exe**. Now right click the file and select **CFF explorer** to check the PE header
|
||||
* Note the imports it's using
|
||||
|
||||
Reference in New Issue
Block a user