Repositori Institusi

Politeknik Siber dan Sandi Negara

  • Home
  • Information
  • News
  • Help
  • Librarian
  • Member Area
  • Select Language :
    Arabic Bengali Brazilian Portuguese English Espanol German Indonesian Japanese Malay Persian Russian Thai Turkish Urdu

Search by :

ALL Author Subject ISBN/ISSN Advanced Search

Last search:

{{tmpObj[k].text}}
Image of Analisis Redline Stealer Malware dengan Metode Surface, Runtime dan Static Code
Bookmark Share

Text

Analisis Redline Stealer Malware dengan Metode Surface, Runtime dan Static Code

Nanang Trianto - Personal Name; Rahmat Purwoko - Personal Name; Ira Rosianal Hikmah - Personal Name; Fahmi Ramadan - Personal Name;

Abstrak:
Data menjadi sebuah sumber daya baru yang mempunyai nilai tinggi sehingga banyak pihak tertarik untuk memilikinya. Banyak cara yang dilakukan untuk mengambilnya, salah satunya penanaman dan penyebaran malware yang dikenal dengan stealer malware. Seiring berjalannya waktu, malware dikatakan semakin canggih, bertarget dan kompleks, serta dikomersialkan dan dapat diskalakan untuk serangan yang lebih luas. Hal tersebut membuat analisis malware menjadi pekerjaan penting yang membutuhkan banyak waktu, keahlian, dan memerlukan pengetahuan yang luas, baik oleh individu maupun oleh tim analis. Pada penelitian ini, dilakukan analisis Redline stealer malware dengan tiga metode analisis yaitu surface, runtime dan static code. Pada analisis malware dengan metode surface dilakukan pengujian terhadap malware dengan cara scanning oleh antivirus, hashing pada malware, dan deteksi paket/obfuscated dilanjutkan dengan analisis Portable Executable serta analisis dengan malware sandbox. Pada metode runtime, malware dijalankan untuk selanjutnya dilakukan beberapa pengamatan perubahan registry, pengamatan aktifitas DNS, dan aktivitas komunikasi data jaringan. Pada metode static code dilakukan pengujian untuk mencari hubungan penggunaan linked libraries dan function, pencarian string sebagai petunjuk langkah kerja dari malware, serta melakukan debugging pada malware untuk menelusuri lebih dalam perilaku malware. Hasil yang didapatkan adalah informasi tentang karakteristik dari stealer malware dan dampaknya terhadap lingkungan uji.
Abstract:
Data becomes a new resource with high value, so many parties are interested in owning it. There are many ways to take it, one of which is planting and spreading malware known as stealer malware. Over time, malware is said to have become more sophisticated, targeted and complex, commercialized, and scalable for a broader range of attacks. This makes malware analysis a critical job requiring a lot of time, expertise, and extensive knowledge, both by individuals and teams of analysts. In this study, analysis of Redline stealer malware was carried out using three analytical methods, namely surface, runtime, and static code. In malware analysis using the surface method, malware is tested by scanning by antivirus, hashing malware, and package/obfuscated detection followed by Portable Executable analysis and malware sandbox analysis. In the runtime method, the malware is run for further observations of registry changes, monitoring of DNS activity, and network data communication activities. In the static code method, testing is carried out to find the relationship between the use of linked libraries and functions, string searches as instructions for working steps of the malware, and debugging the malware to explore deeper into the behavior of the malware. The results are information about redline stealer malware's characteristics and its impact on the test environment.


Availability

No copy data

Detail Information
Series Title
--
Call Number
2023 FAH a
Publisher
Bogor : Politeknik Siber dan Sandi Negara., 2023
Collation
xv, 84 halaman
Language
Indonesia
ISBN/ISSN
--
Classification
Rekayasa Keamanan Siber
Content Type
-
Media Type
-
Carrier Type
-
Edition
--
Subject(s)
Redline
Runtime Analysis
Static Code
Surface Analysis
Stealer Malware
Specific Detail Info
-
Statement of Responsibility
Fahmi Ramadan
Other version/related

No other version available

File Attachment
No Data
Comments

You must be logged in to post a comment

Repositori Institusi
  • Information
  • Services
  • Librarian
  • Member Area

About Us

Search

start it by typing one or more keywords for title, author or subject

Keep SLiMS Alive Want to Contribute?

© 2025 — Senayan Developer Community

Powered by SLiMS
Select the topic you are interested in
  • Computer Science, Information & General Works
  • Philosophy & Psychology
  • Religion
  • Social Sciences
  • Language
  • Pure Science
  • Applied Sciences
  • Art & Recreation
  • Literature
  • History & Geography
Icons made by Freepik from www.flaticon.com
Advanced Search
Where do you want to share?