0xPhoeniX / MazeWalker

Toolkit for enriching and speeding up static malware analysis
GNU Lesser General Public License v3.0
163 stars 34 forks source link

Fixing push by call #11

Closed 0xPhoeniX closed 7 years ago

0xPhoeniX commented 7 years ago

Some samples are using call instruction instead of push to mix code/data in one section. This approach confuses IDA and makes static analysis less pleasant.

MazeTracer can account for each call and ret. By analyzing those sequences, the problematic calls could be filtered and latter fixed in IDA with MazeUI.