Book

Malware Analysis Techniques

Comprehensive threat analysis is important for incident responders as it helps them to ensure that a threat has been entirely eliminated. This book shows you how to quickly triage, identify, attribute, and remediate threats with proper analysis techniques, and guides you in implementing your knowledge to prevent further incidents.

Offered byPackt Logo

Difficulty Level

Intermediate

Completion Time

9h24m

Language

English

About Book

Who Is This Book For?

This book is for incident response professionals, malware analysts, and researchers who want to sharpen their skillset or are looking for a reference for common static and dynamic analysis techniques. Beginners will also find this book useful to get started with learning about malware analysis. Basic knowledge of command-line interfaces, familiarity with Windows and Unix-like filesystems and registries, and experience in scripting languages such as PowerShell, Python, or Ruby will assist with understanding the concepts covered.

Book content

chapters 9h24m total length

Creating and Maintaining Your Detonation Environment

Static Analysis – Techniques and Tooling

Dynamic Analysis – Techniques and Tooling

A Word on Automated Sandboxing

Advanced Static Analysis – Out of the White Noise

Advanced Dynamic Analysis – Looking at Explosions

Advanced Dynamic Analysis Part 2 – Refusing to Take the Blue Pill

De-Obfuscating Malicious Scripts – Putting the Toothpaste Back in the Tube

The Reverse Card – Weaponization of IOCs and OSINT for Defense

Malicious Functionality – Mapping your sample’s behavior against MITRE ATT&CK

Challenge Solutions

Related Resources

Access Ready-to-Use Books for Free!

Get instant access to a library of pre-built books—free trial, no credit card required. Start training your team in minutes!

No credit card required