The Go language is increasingly used by malware authors, and its binaries cannot be tackled with the usual approach. This combination makes Go malware a tough nut to crack for a reverse engineer. In his ‘Zero-knowledge Go Reverse-engineering’ workshop Ivan Kwiatkowski, Kaspersky’s senior security researcher, shares his experience in dissecting Go binaries and demonstrates how to analyze a real life malware sample.