Useful Links
Computer Science
Cybersecurity
Malware Analysis
1. Fundamentals of Malware Analysis
2. Setting Up the Analysis Laboratory
3. Basic Static Analysis
4. Basic Dynamic Analysis
5. Advanced Static Analysis (Code-Level)
6. Advanced Dynamic Analysis (Debugging)
7. Analysis of Obfuscated and Evasive Malware
8. Specialized Malware Analysis
9. Memory Forensics in Malware Analysis
10. Reporting and Threat Intelligence Integration
Basic Static Analysis
Analyzing without Execution
Goals and Limitations
Safety Considerations
File Identification and Hashing
File Type Identification
File Extensions
Magic Numbers
MIME Types
Hashing Algorithms
MD5
SHA-1
SHA-256
SHA-512
Fuzzy Hashing
ssdeep
TLSH
Use Cases in Malware Analysis
String Extraction
ASCII Strings
Unicode Strings
Wide Character Strings
String Extraction Tools
strings (Linux/Unix)
BinText
FLOSS
Identifying Interesting Strings
IP Addresses and Domains
File Paths
Registry Keys
User-Agents
Error Messages
URLs and Email Addresses
Cryptographic Constants
Examining File Headers
Portable Executable (PE) Format (Windows)
PE Structure Overview
DOS Header
NT Headers
PE Sections
.text Section
.data Section
.rsrc Section
.reloc Section
Custom Sections
Import Address Table (IAT)
Export Address Table (EAT)
Timestamps
Digital Signatures
Version Information
Executable and Linkable Format (ELF) (Linux)
ELF Structure Overview
ELF Header
Program Headers
Section Headers
Symbol Tables
String Tables
Identifying Packers and Obfuscators
Common Packers
UPX
ASPack
PECompact
Themida
Packer Detection Tools
PEiD
Detect It Easy (DIE)
ExeInfo PE
Automated Detection
Entropy Analysis
Calculating Entropy
Interpreting Results
High Entropy Indicators
Analyzing Embedded Resources and Metadata
Resource Extraction
Icons and Images
Version Information
Manifest Files
Metadata Analysis
Compilation Timestamps
Compiler Information
Debug Information
Embedded Files and Objects
Extracting Embedded Executables
Configuration Data
Certificates
Previous
2. Setting Up the Analysis Laboratory
Go to top
Next
4. Basic Dynamic Analysis