Other script languages
In this chapter, we covered the most common examples of languages used nowadays. But what if you encounter something more exotic that you don’t have a ready step-by-step tutorial for? Or what if a new script language becomes increasingly popular, is available on lots of systems, and is, therefore, misused by malicious actors? Don’t panic – we have summarized the ideas that will help you successfully analyze any new threat.
Where to start
Here is what you should do when analyzing a new threat:
- Identify the language. There are multiple ways to do this, as follows:
- Look at the file extensions used
- Use the file tool
- Search for the header signature online
- Check strings as they may give additional clues
- If the script requires some particular OS, make sure that you have a proper VM image set up.
If the script language is compiled, search for tools such as decompilers or disassemblers to make static analysis possible.
-
...