As a malware analyst I sometimes receive Microsoft files which have been manipulated.
E.g. infected by a virus and cleaned afterwards.
Here are some indicators to recognize PE file manipulation. 🧵
Conversation
For native files hash calculation is rather straightforward: twitter.com/sixtyvividtail. But for msil there's some caveats, depending on strong name signing mode (possible a bug in the original implementation, which now has to persist).
Quote Tweet
Ever wondered how /bRepro "timestamps" for msvc reproducible build generated? It's just last 4 bytes of sha256 over binary file, with following defaults:
Show this thread
1
1
8
Hah, may be some day. Meanwhile, I'm expecting someone else >_> to write a blogpost and link to the tweet - that should make it indexable.
1



