Sunday, April 13, 2025
HomeCyber Security NewsGoResolver: A Powerful New Tool for Analyzing Golang Malware

GoResolver: A Powerful New Tool for Analyzing Golang Malware

Published on

SIEM as a Service

Follow Us on Google News

Analyzing malware has become increasingly challenging, especially with the growing popularity of programming languages like Golang.

Golang, or Go, has captivated developers for its extensive features but has also proven to be an attractive choice for malware authors, thanks to its embedded libraries, sizable binaries, and potential for obfuscation.

To combat these challenges, Volexity has introduced GoResolver, an innovative, open-source tool designed to simplify the reverse engineering of obfuscated Golang malware.

- Advertisement - Google News

The Rise of Golang in Malware Development

Golang has emerged as a preferred language for malware developers due to its capability to produce binaries with embedded libraries, making them harder to deconstruct.

Reverse engineers often struggle with analyzing Golang binaries due to their sheer size and complexity. This difficulty is compounded when obfuscation tools like Garble are used to obscure function and package names.

Garble’s obfuscation properties strip symbol tables and randomize names, making manual static analysis tedious and time-consuming.

Garble Obfuscation Properties Analysis
Garble Obfuscation Properties Analysis

Volexity’s investigations frequently encounter Golang malware, prompting the need for advanced solutions to address the challenges posed by such obfuscators. GoResolver was developed in response to this need.

Introducing GoResolver

GoResolver is a groundbreaking open-source tool that leverages control-flow graph similarity techniques to resolve obfuscated function names.

By analyzing the paths a binary takes during execution, GoResolver can identify similarities between control-flow graphs of obfuscated and clean binaries, restoring symbol information that would otherwise be lost.

This approach significantly enhances the ability to reverse engineer malware samples.
This approach significantly enhances the ability to reverse engineer malware samples.

Key features of GoResolver include:

  • Symbol Recovery: Retrieves obfuscated function and package names.
  • Control-Flow Graph Analysis: Identifies graph similarities to recover original symbol information.
  • Integration with Popular Tools: Provides plugins for IDA Pro and Ghidra to streamline workflows.
  • Open-Source Accessibility: Available for download on GitHub, encouraging collaboration and continuous improvement.

Image3

Tackling Garble Obfuscation

Garble is a widely used Golang obfuscator that presents unique challenges. While it strips symbol tables and randomizes names, the obfuscation reveals patterns that GoResolver can exploit.

For example, Garble’s randomized names must remain consistent within a package, enabling analysts to infer package identities.

Using this logic, GoResolver improves symbol recovery by associating functions with their respective packages.

Additionally, GoResolver bypasses obfuscation limitations by fingerprinting Golang runtime versions.

 By testing similarities among runtime fragments, GoResolver efficiently identifies the exact Golang version used to compile the malware, enabling accurate binary analysis.

Volexity demonstrated GoResolver’s capabilities by analyzing a Garble-obfuscated Stowaway agent. Initially, disassembled binaries contained generic names, complicating analysis.

When submitted to GoResolver, the tool identified the Golang version through runtime fingerprinting and resolved obfuscated symbols.

Using control-flow graph similarity, GoResolver restored meaningful function names and package associations, allowing analysts to focus on the malware’s core logic rather than runtime and library methods.

Integration with IDA Pro and Ghidra

To expedite workflows, GoResolver offers plugins for IDA Pro and Ghidra, two of the most widely used reverse-engineering platforms.

SRE Plugins
SRE Plugins

Analysts can choose between analyzing samples directly within the tools or importing pre-generated symbol reports. These plugins enhance efficiency, ensuring seamless integration into malware analysis operations.

When using Ghidra, the following dialogs are shown
When using Ghidra, the following dialogs are shown

GoResolver is a pioneering tool that addresses the growing challenge of reverse-engineering obfuscated Golang malware.

By combining symbol extraction techniques with control-flow graph analysis, GoResolver offers unparalleled capabilities for retrieving lost symbol information and understanding binary layouts.

It empowers cybersecurity analysts to focus on core malware functionality, improving the efficiency of forensic investigations.

Volexity plans to expand GoResolver’s capabilities, including features like automatic Golang string parsing and enhanced binary analysis.

The tool is available for download on GitHub, and the repository will continue to be updated with new features and enhancements.

For cybersecurity professionals tackling Golang malware, GoResolver is a must-have in their arsenal, ensuring deeper insights and faster analysis to combat emerging threats effectively.

Find this News Interesting! Follow us on Google NewsLinkedIn, & X to Get Instant Updates!

Divya
Divya
Divya is a Senior Journalist at GBhackers covering Cyber Attacks, Threats, Breaches, Vulnerabilities and other happenings in the cyber world.

Latest articles

Threat Actors Manipulate Search Results to Lure Users to Malicious Websites

Cybercriminals are increasingly exploiting search engine optimization (SEO) techniques and paid advertisements to manipulate...

Hackers Imitate Google Chrome Install Page on Google Play to Distribute Android Malware

Cybersecurity experts have unearthed an intricate cyber campaign that leverages deceptive websites posing as...

Dangling DNS Attack Allows Hackers to Take Over Organization’s Subdomain

Hackers are exploiting what's known as "Dangling DNS" records to take over corporate subdomains,...

HelloKitty Ransomware Returns, Launching Attacks on Windows, Linux, and ESXi Environments

Security researchers and cybersecurity experts have recently uncovered new variants of the notorious HelloKitty...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

Threat Actors Manipulate Search Results to Lure Users to Malicious Websites

Cybercriminals are increasingly exploiting search engine optimization (SEO) techniques and paid advertisements to manipulate...

Hackers Imitate Google Chrome Install Page on Google Play to Distribute Android Malware

Cybersecurity experts have unearthed an intricate cyber campaign that leverages deceptive websites posing as...

Dangling DNS Attack Allows Hackers to Take Over Organization’s Subdomain

Hackers are exploiting what's known as "Dangling DNS" records to take over corporate subdomains,...