This session opens with a quick demo to explain malware analysis using certain tools. Next, we'll download a malware code from the Github site. The required malware analysis tools are also downloaded on the virtual machine. We will then discuss how to identify indicators (or IOC's) for a Dyre malware. The tools that will be explored for IOC's are CaptureBAT, RegShot, and Autoruns. You'll also learn how these tools help in identifying malware activity and how do they differ from each other.
Intro to Malware Analysis and Reverse Engineering
In this course you will learn how to perform dynamic and static analysis on all major files types, how to carve malicious executables from documents and how to recognize common malware tactics and debug and disassemble malicious binaries.