I'm interested in analyzing XtremeRAT. The "server" sample I am looking at is the 3.6 Private version. I understand that this file was created using the builder and is a VB PE file. Does anyone have pointers on how to reverse/analyze VB malware? I'm beginning to read the legend of random's VB Ollydbg guides but I've been unsuccessful at finding any other good tutorials on analyzing VB malware. Does anyone have any recommendations, either through experience of analyzing XtremeRAT or other VB malware? Thanks!
Well to begin you seem to be way off to start analyzing .NET malwares, so I will point you on the right direction.
For .NET you don't need Olly, of course you will at some point, but not for the main analysis part, for main analysis, you're better of with dnSpy
Another great reversing tool is WinDBG, for .NET is amazing, as it helps greatly to dump files that are encrypted/decrypted in memory, don't get me wrong dnSpy can do all of this, however WinDBG could be an extra.