In this chapter, we became familiar with malware targeting non-Windows systems such as Linux commonly powering the Internet of Things devices. At first, we went through the basics of the ELF structure and covered system calls. We described the general malware behavior patterns shared across multiple platforms, went through some of the most prevalent examples, and covered the common tools and techniques used in a static and dynamic analysis.
Then, we took a look at the Mirai malware, summarized its behavior, and put the newly obtained knowledge into practice by using it as an example. Finally, we summarized techniques that are used in the static and dynamic analysis for malware targeting the most common RISC platforms, such as ARM or MIPS. At this stage, you should have enough fundamental knowledge to start analyzing malware for virtually any common architecture.
In Chapter 11, Introduction to macOS and iOS Threats, we will cover malware targeting Apple systems as this has become...