Reverse Engineering Mac Malware

  • Monday, 23 Mar 2015 7:00PM EST (23 Mar 2015 23:00 UTC)
  • Speaker: Sarah Edwards

Dynamic malware reverse engineering helps forensic analysts and reverse engineers gather quick data points such as callout domains, file download URLs or IP addresses, and dropped or modified files. These methods have long been used on Windows why not Mac malware? This presentation introduces the audience to methods, tools, and resources to assist reversing Mac binaries with a Mac. Topics include Mach-O file format, virtualization, analysis VM setup, and various analysis tools (native and 3rd-party). This presentation is intended for those familiar with dynamic analysis (with a touch of static thrown in) or for those reverse engineering masters of the Windows executable to get an introductory idea of how to start analyzing Mac malware.