Reverse EngineeringMalware

pe-viewerC:\Samples\mzheader reverse engineering / malware
.text Characteristics: 0x60000020
.text:0000 ; Liam Chugg — Security Researcher @ CrowdStrike
.text:0004 ; I enjoy picking apart malware, everything here is reproducible if you want to follow along
.text:0010 ; ────────────────────────────────────────────────────────
.text:0014 ; Hey! I'm Liam, a Security Researcher at CrowdStrike. I originally started this blog while working as a security analyst, mainly as a way to get into reverse engineering by sharpening my skills and developing my technical writing ability. Over time it's grown into a place where I share things I find interesting, from CTF / CrackMe challenges to deep dives on random malware samples.
.text:0030 ; ────────────────────────────────────────────────────────
Section[1]  .rsrc  VirtualAddress: 0x00004000   VirtualSize: 0x00001200   Characteristics: 0x40000040
.rsrc Characteristics: 0x40000040
Section[2]  .idata  VirtualAddress: 0x00006000   VirtualSize: 0x00000600   Characteristics: 0x40000040
.idata Characteristics: 0x40000040
RESOURCE_DATA RT_RCDATA
; hover a .rsrc entry
; to inspect resource data