⚙️ Binary Analysis Studio

Ghidra-Powered Reverse Engineering Platform

🗂️ Project Explorer

📁 malware_sample.exe
📄 .text (executable)
📄 .data (initialized data)
📄 .rdata (read-only data)
📄 .rsrc (resources)
📄 .reloc (relocations)

📋 Analysis Info

Architecture: x86-64
File Size: 2.4 MB
Entry Point: 0x140001000
Functions: 1,247
Instructions: 54,892
Strings: 342

💻 Disassembly View

140001000 48 83 EC 28 SUB RSP, 0x28
140001004 48 8D 0D 35 2F 00 00 LEA RCX, [0x140003f40]
14000100B E8 F0 1E 00 00 CALL FUN_140002f00
140001010 48 85 C0 TEST RAX, RAX
140001013 74 1A JZ LAB_14000102f
140001015 48 8D 15 2C 2F 00 00 LEA RDX, [s_Hello_World_140003f48]
14000101C 48 8B C8 MOV RCX, RAX
14000101F E8 DC 1E 00 00 CALL printf

🎯 Function Analysis

entry
0x140001000 (45 bytes)
✓ Analyzed
main
0x140001030 (123 bytes)
✓ Analyzed
decrypt_string
0x140001200 (89 bytes)
⚠ Suspicious
network_connect
0x140001350 (156 bytes)
⚠ High Risk

🔍 Hex Viewer

00000000 4D 5A 90 00 03 00 00 00 04 00 00 00 FF FF 00 00 MZ..............
00000010 B8 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00 ........@.......
00000020 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
00000030 00 00 00 00 00 00 00 00 00 00 00 00 F8 00 00 00 ................
000000F8 50 45 00 00 64 86 07 00 A4 F5 6C 65 00 00 00 00 PE..d.....le....