A PRACTICAL APPROACH TO MALWARE ANALYSIS
Keywords:malware, cybersecurity, malware analysis, forensics, malware analysis tools
Malware analysis takes significant place at the intersection of incident response, forensics, and security monitoring, and system and network administration. The reason behind performing malware analysis is to extract information from a malware sample that can assist in responding to a malware incident. From a business perspective malware analysis is critical for saving valuable data of many organizations since the control of any IT system vulnerability in the wrong hands can have unexpected consequences. In this article we will cover general practical aspects and pre requirements needed for quick start in this area.
6 Common Types of Malware [Electronic resource] – Resource access mode: https://blog.totalprosource.com/5-common-malware-types.
What is Keylogging? [Electronic resource] // Avast Software s.r.o – Resource access mode: What is Keylogging?
The 11 most common types of malware [Electronic resource] // Crowdstrike. – 2020. – Resource access mode: https://www.crowdstrike.com/cybersecurity-101/malware/types-of-malware/.
Backdoor computing attacks [Electronic resource] // Terms of Service – Resource access mode: https://www.malwarebytes.com/backdoor/.
Volatile Memory Acquisition Tool: RAM Capturer [Electronic resource]. – 2016. – Resource access mode: https://vulners.com/n0where/N0WHERE:131256.
Kroll Artifact Parser and Extractor (KAPE) Training [Electronic resource] // Duff & Phelps – Resource access mode:
GRR on GitHub [Electronic resource] // GRR team. – 2019. – Resource access mode: https://grr-doc.readthedocs.io/en/latest/.
Xoslab.com [Electronic resource] // Xoslab.COM. – 2020. – Resource access mode: http://xoslab.com.
This work is licensed under a Creative Commons Attribution 4.0 International License.