

[ѱ Ư η ] Բ ϰ Ͼ Ʈ Ͼ ַ ҽڵ尡 ȯ濡 Ÿ α м ȴ. Ͼ (Ghidra) Ϸ ̿ܿ پ Űó Ͽ Ǽ α м, ߿ м, پ о߿ Ȱ ִ. Ȱϱ ؼ dz ʿϴ. å ǽ ߽ ̳ м ȿ ֵ ߴ. پ α мϸ ü ̸ ٶ.

̹潺(cyberdefense) ҿ Cyber Threat Intelligence Analyst ϸ ֿ м, , м ð ִ. о Ŭ ü(Allsafe) ̱ ϴ. JSAC, HITCON CMT, AVAR, CPRCon, Black Hat EUROPE Arsenal, CodeBlue BlueBox ߴ.

CHAPTER 1 Ͼ Թ1.1 Ͼ1.2 α 1.3 ȣ Ծ1.4 C 1.5 PE 1.6 x64 ŰóCHAPTER 2 Թ2.1 2.2 ġ2.3 Ʈ2.4 Ʈ 2.5 CodeBrowserCHAPTER 3 Ͼ 3.1 downloader.exe3.2 м ٹ3.3 Լ μ м3.4 ü 3.5 downloader.exe м ġCHAPTER 4 Ghidra Script/Extension Ȯ 4.1 Ȯ4.2 Ghidra Script 4.3 Ghidra API4.4 Headless Analyzer4.5 Ghidra ExtensionCHAPTER 5 Ghidra vs. Crackme - ELF ũ м5.1 ũ̶5.2 Level1 XOR ܼ ڴ5.3 Level2 Ŀ ڴ5.4 Level3 ÷5.5 Level4 Go ̳ʸ ؼCHAPTER 6 Ghidra vs. MOTHRA - 鵵 м 6.1 м غ6.2 main Լ6.3 C2 ɾ ˻6.4 ɾ б6.5 MOTHRA RAT м ġCHAPTER 7 Ghidra vs. BlackBicorn - Ŀ м7.1 Ŀ7.2 BlackBicorn 7.3 BlackBicorn м( 0)7.4 BlackBicorn м( 1)7.5 BlackBicorn м( 2)7.6 BlackBicorn м ġCHAPTER 8 Ghidra vs. Godzilla Loader - ֿ м8.1 ֿ Godzilla Loader8.2 м 8.3 Ŀ м8.4 ڿ ȭ 8.5 Godzilla Loader 8.6 Godzilla Loader м ġCHAPTER 9 Ghidra vs. SafeSpy - ȵ̵ м9.1 ȵ̵ 9.2 ȵ̵ Ƽ ̺귯 9.3 ȵ̵ м9.4 SafeSpy мAPPENDIX A A.1 Binary PatchingA.2 Program DifferenceA.3 Version TrackingA.4 Ghidra ServerA.5 ĿA.6 ÷ Ű APPENDIX B Ghidra Script ҰB.1 Ghidra ScriptB.2 Ƽ Ghidra ScriptB.3 ڵ ũƮAPPENDIX C ǮC.1 Level1.exeC.2 Level2.exe