In this chapter, we covered multiple script languages and document macros that are often misused by attackers. We described the motivation behind a malware writer's decision when they are choosing a particular approach. Additionally, we explored ready-to-use recipes on how to solve particular challenges specific to each language and summarized what functionality to pay attention to. You also gained a good understanding of various tools that will drastically help speed up analysis.
Finally, we covered generic approaches on how to handle malicious code written on virtually any script language that you might encounter. We also discussed the sequence of actions to follow in order to analyze malicious code in the most efficient way.
After completing this chapter, you will be able to successfully perform static and dynamic analysis of various scripts, bypass anti-reversing techniques, and understand the core functionality of malware.
In Chapter 10, Dissecting Linux and IoT Malware...