Malware Analysis
Last updated
Last updated
Before analyzing malware, it’s recommended to build a sandbox for malware analysis. Below are useful tools for building such an environment.
FLARE VM
It is a collection of software installations scripts for Windows systems to maintain a reverse engineering environment on a virtual machine.
REMnux
A Linux toolkit for malware analysis.
An interactive online malware sandbox.
A free online malware analysis.
First off, we get the hash of the malware.
We can use the hash for finding details of malware, so copy the output hash.
We can search the information about malware by searching the hash.
In search form, input the hash value as below.
Now access to websites listed the search result.
VirusTotal analyses suspicious files, domains, IPs and URLs to detect malware and other breaches, automatically share them with the security community. To search the information about suspicious files, first get the hash in our terminal.
We can input the hash in Browse Database as below.
Resource Hacker is a resource extraction utility and resource compiler for Windows.
By opening a malware file, we can retrieve detail information about the file in “Version Info”.
We can find specific text contained in the malware.
Ghidra is a reverse engineering software.
PE-bear is a multi-platform reversing tool for PE files.
An open-source mobile threat Intelligence platform.
It monitors system resources, debug software and detect malware.
ProcDOT is a visual malware analysis tool. To investigate logs, in Monitoring Logs, open a log file (.csv) in Procmon and open a dump file in WinDump. Then click “Refresh”. Executable files and PID listed.
The pattern matching swiss knife for malware researchers.
Automation Tools
Manual
Find Files Matches Rules
Create Rules
Create "rule.yar".
LKM Linux rootkit.
also analyses suspicious files.
detects capabilities in executable files.