Useful Links
Computer Science
Cybersecurity
Malware Analysis
1. Fundamentals of Malware Analysis
2. Setting Up the Analysis Laboratory
3. Basic Static Analysis
4. Basic Dynamic Analysis
5. Advanced Static Analysis (Code-Level)
6. Advanced Dynamic Analysis (Debugging)
7. Analysis of Obfuscated and Evasive Malware
8. Specialized Malware Analysis
9. Memory Forensics in Malware Analysis
10. Reporting and Threat Intelligence Integration
Analysis of Obfuscated and Evasive Malware
Code Obfuscation Techniques
Dead-Code Insertion
Junk Instructions
Unreachable Code
Instruction Substitution
Equivalent Instructions
Complex Instruction Sequences
Control Flow Flattening
Switch-Based Obfuscation
Dispatcher Loops
String Encryption
XOR Encryption
Custom Encryption Algorithms
String Decryption Techniques
Runtime Decryption
Key Recovery
Polymorphic Code
Mutation Engines
Variable Encryption Keys
Metamorphic Code
Code Rewriting Techniques
Semantic Preservation
Anti-Analysis Techniques
Anti-Disassembly
Opaque Predicates
Jump Table Obfuscation
Code Tricks to Confuse Disassemblers
Anti-Debugging
Debugger Detection
IsDebuggerPresent
CheckRemoteDebuggerPresent
PEB Flags
Timing Attacks
RDTSC Instructions
Sleep-Based Detection
Exception-Based Techniques
Structured Exception Handling
Vectored Exception Handling
Anti-VM (Virtual Machine Evasion)
Detecting VM Artifacts
VM-Specific Files
VMware Tools
VirtualBox Additions
Registry Keys
VM-Specific Entries
Processes
VM Service Processes
Identifying Hardware Inconsistencies
CPU Features
Memory Layout
Hardware IDs
Sandbox Evasion
Stalling and Sleep Loops
Long Sleep Periods
CPU-Intensive Loops
User Interaction Checks
Mouse Movement
Keyboard Input
Environment Fingerprinting
System Uptime
Installed Software
File System Analysis
Previous
6. Advanced Dynamic Analysis (Debugging)
Go to top
Next
8. Specialized Malware Analysis