Challenge
Utilizing the malware sample pack provided for this chapter, attempt to answer the following questions:
- Is the sample packed? If so, with what packer?
- Were you able to unpack the sample? What is the SHA256 of the unpacked sample?
- What DLLs/libraries exist within the IAT?
- What APIs are referenced that you would deem suspicious or possibly related to anti-analysis techniques, if any?