Cody Johnston wrote:AlphaCrypt - this looks heavily based on TeslaCrypt (based on some quick static analysis anyways)
I originally found a post about it here http://www.malware-traffic-analysis.net ... index.html
Attaching the sample for convenience
https://www.virustotal.com/en/file/7bdc ... 430412022/
Hi,
I tried to perform analysis on this sample.
Based on static and basic dynamic analysis, i was able to figure out its functionality.
But when i moved to OllyDbg and IdaPro, to dig deeper, I feel completely lost.
I am relatively new to reverse engineering, and have analysed 5-6 malware till date. Everytime when i used to check them on IdaPro/OllyDbg, i could actually see them using Windows libraries and it was kind of easy to follow the flow of execution.
However, with this sample, I know they are using many windows libraries because of prior analysis, but seems to have been used in a different way (I am assuming using GetProcAddress). Because of this I am not able to see the flow of execution and its hard for me to answer questions like what kind of encryption technique is into use.
Can someone tell me how to approach situations like these.
Appreciate the help :)
Regards,
Ashish