Post by Yuval Malachi, TrapX Security CTO, Vice President and Co-Founder
Get a head start on reverse engineering with deception technology.
Reverse engineering to determine the full functionality of the binary is the ultimate form of static analysis — but there’s another way to approach it. A dynamic analysis can provide a valuable head start in understanding what the malware binaries are designed to do in your network environment. With this approach, you capture the malware in a with deception technology and shunt it into a sandbox where the binaries execute in a safe environment. This way you can extract the forensic data and reveal exactly what the binaries are designed to do to your network connections.
Dynamic analysis jump starts your reverse engineering efforts with rapid “first pass” information that reveals immediately what the binaries are trying to do. You can then drill down into how they’re doing it with your reverse engineering tools. This can save you a lot of time. You might not even need to undertake a full manual reverse engineering effort once you have the information from the dynamic analysis.
You can start dynamic analysis now by downloading and using DeceptionGrid. All of this and much more is included with our latest release.