I also tweet, blog and . Contact Me|Professional

Reverse-Engineering Malware Cheat Sheet

This is a cheat sheet of shortcuts and tips for reverse-engineering malware. It covers the general malware analysis process, as well as useful tips for OllyDbg, IDA Pro, and other tools. Feel free to customize it to your own needs. My reverse-engineering malware course explores these, and other useful techniques.

General Approach

  1. Set up a controlled, isolated laboratory in which to examine the malware specimen.
  2. Perform behavioral analysis to examine the specimenís interactions with its environment.
  3. Perform static code analysis to further understand the specimenís inner-workings.
  4. Perform dynamic code analysis to understand the more difficult aspects of the code.
  5. If necessary, unpack the specimen.
  6. Repeat steps 2, 3, and 4 (order may vary) until sufficient analysis objectives are met.
  7. Document findings and clean-up the laboratory for future analysis.

Behavioral Analysis

Be ready to revert to good state via dd, VMware snapshots, CoreRestore, Ghost, SteadyState, etc.

Monitor local (Process Monitor, Process Explorer) and network (Wireshark, tcpdump) interactions.

Detect major local changes (RegShot, Autoruns).

Redirect network traffic (hosts file, DNS, Honeyd).

Activate services (IRC, HTTP, SMTP, etc.) as needed to evoke new behavior from the specimen.

IDA Pro for Static Code Analysis

Text searchAlt+T
Show strings windowShift+F12
Show operand as hex valueQ
Insert comment:
Follow jump or call in viewEnter
Return to previous viewEsc
Go to next viewCtrl+Enter
Show names windowShift+F4
Display function's flow chartF12
Display graph of function callsCtrl+F12
Go to program's entry pointCtrl+E
Go to specific addressG
Rename a variable or functionN
Show listing of namesCtrl+L
Display listing of segmentsCtrl+S
Show cross-references to selected functionSelect function name » Ctrl+X
Show stack of current functionCtrl+K

OllyDbg for Dynamic Code Analysis

Step into instructionF7
Step over instructionF8
Execute till next breakpointF9
Execute till next returnCtrl+F9
Show previous executed instruction-
Show next executed instruction+
Return to previous view*
Show memory mapAlt+M
Follow expression in viewCtrl+G
Insert comment;
Follow jump or call in viewEnter
Show listing of namesCtrl+N
New binary search Ctrl+B
Next binary search resultCtrl+L
Show listing of software breakpointsAlt+B
Assemble instruction in place of selected oneSelect instruction » Spacebar
Edit data in memory or instruction opcodeSelect data or instruction » Ctrl+E
Show SEH chainView » SEH chain
Show patchesCtrl+P

Bypassing Malware Defenses

To try unpacking quickly, infect the system and dump from memory via LordPE or OllyDump.

For more surgical unpacking, locate the Original Entry Point (OEP) after the unpacker executes.

If cannot unpack cleanly, examine the packed specimen via dynamic code analysis while it runs.

When unpacking in OllyDbg, try SFX (bytewise) and OllyDump's "Find OEP by Section Hop".

Conceal OllyDbg via HideOD and OllyAdvanced.

A JMP or CALL to EAX may indicate the OEP, possibly preceded by POPA or POPAD.

Look out for tricky jumps via SEH, RET, CALL, etc.

If the packer uses SEH, anticipate OEP by tracking stack areas used to store the packers' handlers.

Decode protected data by examining results of the decoding function via dynamic code analysis.

Correct PE header problems with XPELister, LordPE, ImpREC, PEiD, etc.

To get closer to OEP, try breaking on unpackerís calls to LoadLibraryA or GetProcAddress.

Common x86 Registers and Uses

EAXAddition, multiplication, function results
EBPBase for referencing function arguments (EBP+value) and local variables (EBP-value)
ESPPoints to the current "top" of the stack; changes via PUSH, POP, and others
EIPPoints to the next instruction
EFLAGS Contains flags that store outcomes of computations (e.g., Zero and Carry flags)


If you have suggestions for improving this cheat sheet, please let me know.

Creative Commons v3 "Attribution" License for this Cheat Sheet v.1.6.

Take a look at my other security cheat sheets.

Authored by Lenny Zeltser. Lenny is a business and tech leader with extensive experience in information technology and security. His areas of expertise include incident response, cloud services and product management. Lenny focuses on safeguarding customers' IT operations at NCR Corporation. He also teaches digital forensics and anti-malware courses at SANS Institute. Lenny frequently speaks at conferences, writes articles and has co-authored books. He has earned the prestigious GIAC Security Expert designation, has an MBA from MIT Sloan and a Computer Science degree from the University of Pennsylvania. You can follow Lenny on Twitter, read his blog and .