Analyzing a Reverse Shell Part II: Parent-Child Process Analysis

We can discover malware by taking a look at the process tree

Untitled

Every interactive element is most likely to be a child of the explorer.exe process, then the malware has cmd as a child with a command as params which then has the command binary as a child

Malware writers always try to decorrelate this process tree to make the malware less detectable

Then we can filter, taking the executable as the parent ID and look for any child process

Analyzing a Reverse Shell Part I: Correlating IOCs

RAT.Unkown2.exe.malz

strings

Dynamic Analysis of Unknown Binaries Part II: Host-Based Indicators