Analisis Malware PlasmaRAT dengan Metode Reverse Engineering
Abstract
Keywords
Full Text:
PDFReferences
P. S. Helode, Dr. K. H. Walse, and Karande M.U., “A Methodology of Malware Analysis, Tools and Technique for windows platform – RAT Analysis,” Int. J. Innov. Res. Comput. Commun. Eng., vol. 5, no. 4, pp. 8198–8205, 2017, doi: 10.15680/IJIRCCE.2017.
E. Haryanto, “Analisis Forensik Malicious Software Wso Webshell Pada Platform Linux,” pp. 1–11, 2015.
T. Pajar Setia, N. Widiyasono, and A. Putra Aldya, “Analysis Malware Flawed Ammyy RAT Dengan Metode Reverse Engineering,” J. Inform. J. Pengemb. IT, vol. 3, no. 3, pp. 371–379, 2018, doi: 10.30591/jpit.v3i3.1019.
J. Li, D. Gu, and Y. Luo, “Android malware forensics: Reconstruction of malicious events,” Proc. - 32nd IEEE Int. Conf. Distrib. Comput. Syst. Work. ICDCSW 2012, pp. 552–558, 2012, doi: 10.1109/ICDCSW.2012.33.
V. Sahfitri, M. Universitas, B. Darma, D. Universitas, and B. Darma, “Analisis Forensik Malware Pop-Up Ads Iklan Pada Platform Android,” no. 03, 2015.
A. H. Muhammad, B. Sugiantoro, A. Luthfi, M. Teknik, I. Universitas, and I. Indonesia, “METODE KLASIFIKASI DAN ANALISIS KARAKTERISTIK MALWARE MENGGUNAKAN KONSEP ONTOLOGI,” no. 1, 2004.
T. A. Cahyanto, V. Wahanggara, and D. Ramadana, “Analisis dan Deteksi Malware Menggunakan Metode Malware Analisis Dinamis dan Malware Analisis Statis,” Justindo, J. Sist. Teknol. Inf. Indones., vol. 2, no. 1, pp. 19–30, 2017, [Online]. Available: http://jurnal.unmuhjember.ac.id/index.php/JUSTINDO/article/view/1037.
H. A. Nugroho and Y. Prayudi, “Penggunaan Teknik Reverse Engineering Pada Malware Analysis Untuk Identifikasi Serangan Malware,” Knsi, pp. 27–28, 2014.
R. Novrianda, Y. N. Kunang, and P. . Shaksono, “Analisis Forensik Malware Pada Platform Android,” Konf. Nas. ilmu Komput., pp. 141–148, 2014.
A. Kurniawan and Y. Prayudi, “Teknik Live Forensics Pada Aktivitas Zeus Malware Untuk Mendukung Investigasi Malware Forensics,” HADFEX (Hacking Digit. Forensics Expo., pp. 1–5, 2014.
D. R. Septiani, N. Widiyasono, and H. Mubarok, “Investigasi Serangan Malware Njrat Pada PC,” J. Edukasi dan Penelit. Inform., vol. 2, no. 2, pp. 123–128, 2016, doi: 10.26418/jp.v2i2.16736.
R. Faisal, T. Hidayat, and I. Alam, “Reverse Engineering Analysis Statis Forensic Malware Webc2-Div,” vol. 4, no. 1, pp. 15–19, 2018.
A. P. Aldya, N. Widiyasono, and T. P. Setia, “Reverse Engineering untuk Analisis Malware Remote Access Trojan,” J. Edukasi dan Penelit. Inform., vol. 5, no. 1, p. 40, 2019, doi: 10.26418/jp.v5i1.28214.
DOI: http://dx.doi.org/10.30872/jurti.v4i2.4131
Refbacks
- There are currently no refbacks.
Copyright (c) 2021 Jurnal Rekayasa Teknologi Informasi (JURTI)

This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
Alamat Redaksi :
Program Studi Informatika
Fakultas Teknik
Jl. Sambaliung No. 9 Kampus Gunung Kelua Samarinda 75119 - Kalimantan Timur
e-mail : jurti.unmul@fkti.unmul.ac.id
Url : http://e-journals.unmul.ac.id/index.php/INF
Contact Person : Medi Taruk [081543438301]
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.