Malware Analysis / Reverse Engineering Notes

Dynamic analysis: tools

Samples: Github/Contagio/Honeypot/Malware.lu Password: infected Tools : CaptureBAT,Regshot, Autorun,Notepad etc   [view]

By: munjal | Related Lesson: Dynamic Analysis Part 1.2 | Modified: January 28, 2018

Malware sources

Malware resources  The zoo on github contagio malware dump malshare  mlware.lu malware blacklist malware db open malware securebox labs virusshare   [view]

By: bakir malik | Related Lesson: Dynamic Analysis Part 1.3 | Modified: January 28, 2018

dyre malware part1

In Dyre Malware a pdf looking documetn is an exe file. it deletes itself as soon as we run the malware. it creates a process called google updaterr. it changes HKCU registry to run when the current user boots up. Tools used: Bat,Rigshot,autorun     [view]

By: bakir malik | Related Lesson: Dynamic Analysis Part 1.2 | Modified: January 28, 2018

Dynamic Malware Analysis 1.1

Dynamic Malware analysis: – Execute the malware: run the code in a virtual machine Problems: some code doesn’t get executed as we don’t have the specific environment or the conditions are not met, don’t have required software [view]

By: munjal | Related Lesson: Dynamic Analysis Part 1.1 | Modified: February 25, 2018

Dynamic Analysis Part 2

Github for malware downloads [view]

By: bmesser513 | Related Lesson: Dynamic Analysis Part 1.2 | Modified: January 27, 2018

Dynamic MA Part One

Execute the Malware First response Generate indicators of compromise Determine malware type/family Assess risk and Impact Attribution [view]

By: bmesser513 | Related Lesson: Dynamic Analysis Part 1.1 | Modified: January 27, 2018

later

pe format    mem address space 8086   [view]

By: deepakmeena635 | Related Lesson: Basic Static Analysis Part 2 | Modified: January 27, 2018

lab setup 3

some malware do know the vmware environment and can act differently and start its defensive mechanisms.  changing mac address will help malware also checks what is the ip address of the machine its running on by sending lookup packets to internet. B [view]

By: bakir malik | Related Lesson: Lab Setup Part 3 | Modified: January 26, 2018

Lab Setup Part 1

VMware or VirtualBox [view]

By: bmesser513 | Related Lesson: Lab Setup Part 1 | Modified: January 25, 2018

Malware Introduction

70-90% des samples malwares sont développés pour une organisation (Verizon Data Breach Report 2015)   [view]

By: cyberkaser | Related Lesson: Intro Part 1 | Modified: January 25, 2018

« First ‹ Previous 1 9 10 11 12 13 21 89 Next › Last »

Our Revolution

We believe Cyber Security training should be free, for everyone, FOREVER. Everyone, everywhere, deserves the OPPORTUNITY to learn, begin and grow a career in this fascinating field. Therefore, Cybrary is a free community where people, companies and training come together to give everyone the ability to collaborate in an open source way that is revolutionizing the cyber security educational experience.

Cybrary On The Go

Get the Cybrary app for Android for online and offline viewing of our lessons.

Get it on Google Play
 

Support Cybrary

Donate Here to Get This Month's Donor Badge

 
Skip to toolbar

We recommend always using caution when following any link

Are you sure you want to continue?

Continue
Cancel