Introduction to Malware Analysis for Incident Responders
This is a subtitle. Get more detailed about your course here!
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Sed at ante vitae nulla vulputate elementum. Maecenas imperdiet malesuada lacinia. Donec sit amet aliquet urna. Nam sit amet eros dapibus, commodo ligula a, imperdiet mi. Fusce rhoncus eros in leo rutrum, at lobortis leo sodales. Quisque nibh tellus, rutrum placerat turpis ac, ullamcorper suscipit nisl. Nullam faucibus quam a leo imperdiet, vel blandit nibh iaculis. Duis efficitur ipsum eu eros fermentum, in volutpat erat tincidunt. Curabitur sit amet vulputate sem. Donec vel facilisis est. Morbi vitae mollis massa, sed maximus ex. Duis elit orci, scelerisque ut erat eu, tincidunt euismod erat.
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Sed at ante vitae nulla vulputate elementum. Maecenas imperdiet malesuada lacinia. Donec sit amet aliquet urna. Nam sit amet eros dapibus, commodo ligula a, imperdiet mi. Fusce rhoncus eros in leo rutrum, at lobortis leo sodales. Quisque nibh tellus, rutrum placerat turpis ac, ullamcorper suscipit nisl. Nullam faucibus quam a leo imperdiet, vel blandit nibh iaculis. Duis efficitur ipsum eu eros fermentum, in volutpat erat tincidunt. Curabitur sit amet vulputate sem. Donec vel facilisis est. Morbi vitae mollis massa, sed maximus ex. Duis elit orci, scelerisque ut erat eu, tincidunt euismod erat.
Welcome to the Course
What is Malware?
Symptoms and Activities
Types of Malware
Infection Vectors
Malware Analysis Overview and Types
Static Analysis
Dynamic Analysis
Install Virtual Box
Install Windows 10 in Virtual Box
Installing FlareVM
InstallingFlareVMUsingPowershellonWindows10-1525305380034
Download Trickster.exe
Creating Snapshots and Isolating FlareVM
Disabling the Firewall and Antivirus
Attempting Static Analysis with Floss
Beginning Dynamic Analysis with Autoruns
Investigating the Scheduled Task
Packet Analysis with Wireshark and Process Monitoring
Files and Folders Created
Static Analysis with Ida and OllyDbg
Static Analysis with Process Dump
Open Source Research
Conclusion