Featured resource
2026 Tech Forecast
2026 Tech Forecast

Stay ahead of what’s next in tech with predictions from 1,500+ business leaders, insiders, and Pluralsight Authors.

Get these insights
  • Course

Reversing the Gophe Spambot: Confronting COM Code and Surmounting STL Snags

BSides Huntsville | Reversing the Gophe Spambot: Confronting COM Code and Surmounting STL Snags | Mike Bailey

Intermediate
40m
(3)

Created by BSides Huntsville

Last Updated Jun 07, 2021

Course Thumbnail
  • Course

Reversing the Gophe Spambot: Confronting COM Code and Surmounting STL Snags

BSides Huntsville | Reversing the Gophe Spambot: Confronting COM Code and Surmounting STL Snags | Mike Bailey

Intermediate
40m
(3)

Created by BSides Huntsville

Last Updated Jun 07, 2021

Get started today

Access this course and other top-rated tech content with one of our business plans.

Try this course for free

Access this course and other top-rated tech content with one of our individual plans.

This course is included in the libraries shown below:

  • Core Tech
What you'll learn

Unobfuscated malware can still be overwhelming to analyze. Even accomplished reverse engineers may feel hand-wavey about STL and COM code. Take for example Gophe, a spambot associated with Dyre campaigns and Trickbot C2, which weighs in around 2.6 MB with a 10 KB WinMain, three embedded binaries, copious STL template-generated code, and multiple flavors of atypical COM usage. COM is 27 years old, and plugins are starting to materialize to automate its analysis, but Gophe presents a strong case for understanding COM directly and applying that knowledge to decompilation instead of assembly listings. Meanwhile, C++ reversing is well-covered, but the literature is largely orthogonal to STL code. In this talk, Michael Bailey of FireEye's FLARE Team will share how to tame STL code with knowledge of a few key structures and how to investigate COM usage that doesn't conform to the norm. This will include a guided tour of a Gophe sample to focus on tactics for effective STL and COM reversing by enriching decompilation in Hex-Rays. We'll examine what Gophe is doing with Outlook.Application, Microsoft's Messaging API (MAPI), and one other COM interface that it uses to hide from view. This reverse engineering case study is all ham and no spam, so bring your appetite!

Reversing the Gophe Spambot: Confronting COM Code and Surmounting STL Snags
Intermediate
40m
(3)
Table of contents

About the author
BSides Huntsville - Pluralsight course - Reversing the Gophe Spambot: Confronting COM Code and Surmounting STL Snags
BSides Huntsville
8 courses 3.8 author rating 13 ratings

BSides Huntsville is for cybersecurity practitioners to engage with others to learn more about the industry.

Get started with Pluralsight