Analyzing a Malicious File
Join over 3 million cybersecurity professionals advancing their career
Sign up with
Required fields are marked with an *
Already have an account? Sign In »
hi and welcome to everyday digital forensics. I'm your hostess, singing said.
And in today's mantra of Imagine Assist, we're gonna be analyzing a malicious file,
since it is that you were gonna use the e clear sight to acquire a malicious file and then using that follower and analyze it using three separate tools we ever virus total, which is a you I tool. There's also an A p I available for this. If you want to automate this process,
you have autopsy and abdicate imager, which were familiar with.
So here we are in the EQ, their site for testing reasons. Your antivirus software should be disabled or pause when you're downloading this file. The E clear site provides four different types of files. You have your dot com You don't chromed out text
and two separates It falls. If you could read more on the difference, says all those files where we're gonna be examining your dot com dot texts and your dot zippo.
So there's just a little overview of the site
where you can download the file.
So the first thing I was gonna be the doctor combat texts,
and we're gonna save this file
And as you can see, we have a foul in our Donald's folder.
So for this point, we're gonna use the virus Total site concert for a file based on I p domain and the sense we're just gonna
through your head and upload
r e clear dot com file
checks the hash. And once they're going to his page, you can see that 65 different engines have detected
on the left. You have the name of the engine.
You also have your community score where
3343 people have said it's OK, while others have said it's not.
You see that you have it, your detection system,
either anti virus or anti my work and then kind of the value that it gives. A lot of this says test file, not of IRS
So just from this, you can kind of tell that this isn't that a malicious file. They may trigger it and made detective for testing purposes. Malicious fob, you go into a little bit more details of the file anti five.
Some of your history is as far as submission to his lost person. Submit the bottle when the fire was created
some of the different names.
These are some of the relations and my hump different nations to these I p addresses or to these systems,
some of the execution parents. So some of the processes or information
processes or files that you may find your machine may have them related.
You can go to your behavior and it'll tell you kind of network traffic. And he falls to some actions that it may take any processes that I meet create.
And then you have your community section where you're able to post comments or re Commons from previous members that have written about their analysis of this while.
So that was virus total. Now, moving over the autopsy, we're gonna see what this malicious follow looks like.
So you're gonna add a data source severing it added logical file.
Now we're going to search for the FAO itself in the download folder.
So we're gonna selected e clear dot com dot text file and on that file only.
We don't know autopsy to perform any analysis that it wants,
and we're finished. No autopsy will go ahead and performance analysis.
So this is just an overview of what the file metadata is any annotations, other occurrence of this file,
some of the text values they can get and the hex few for those files? You can see it. There's not much in it as far as analyzing it from up top. See, we have a definition file the name of the file, and that's about it.
So now we're gonna go over to you after K image.
We're gonna open the contents of that folder, and we're just open. Everything within the Donald's folder
says Exceed Inter Downloads folder. We have multiple directories or zip fouls, but here we're only interested in the e clear dot com dot text file.
So selecting this file,
you see that after Kate gives you the same strings that you are getting an autopsy when you looked at the hex. But these are the string data's that you see in the asking value.
There's not much more that abdicate can give you about this file.
So I hope you enjoyed today's video and where we used to eat clear sight to acquire a malicious file called e clear dot com's out texts
and using three separate tools. We reviewed that file to see what kind of data and information can provide and see the difference between the separate tools bars total provided the most information about the malicious file itself op topsy and after K just kind of gave us a view what was contained in the file.
So I hope you enjoyed today's video. If you have any recommendations or any feedback on this course, please feel free to reach out
if you like to see additional information or topics discussed in a possible part to also feel free to reach out. I really hope you enjoyed and got a lot from this course. I've enjoyed making it and being part of your growth, so I can't you in the next one.