Methodology for analyzing multiple related binaries in a single session
Sessions may contain multiple related binaries (e.g., a main executable + a loader, a game client + a patcher, a malware dropper + a payload, or a server binary + a client binary).
fs_read or binary_info on each file in the session workspace.file_type + entropy_analysis before deep analysis on any single file.If two binaries share the same RC4 KSA initialization, AES key bytes, or XOR key pattern, this is strong evidence they are from the same codebase or developer:
correlation findingA common pattern: binary A (loader) spawns binary B (payload) via:
CreateProcess / ShellExecute with the second binary's path as a string argumentLoadLibraryIndicators:
CreateProcess or WriteFile + CreateThread imports{
"finding_type": "behavior",
"address": "N/A",
"name": "cross_binary_correlation",
"description": "Binary A (loader.exe) contains string 'payload.dll' and CreateProcess import matching binary B (payload.dll) which has only 3 imports consistent with injection target",
"raw_evidence": "<relevant strings/imports output>",
"confidence": "high"
}
When multiple binaries exist and time is limited, prioritize in this order: