RiSec.n0tst3 13 November 2020
This cheat sheet presents tips for analyzing and reverse-engineering malware. It outlines the steps for performing behavioral and code-level analysis of malicious software. Overview of the Malware Analysis Process Use automated analysis sandbox tools for an initial assessment of the suspicious file. Set up a controlled, isolated laboratory in which to examine the malware specimen. Examine static properties and meta-data of the specimen for triage and early theories. Perform behavioural analysis to examine the specimen’s interactions with its environment. Perform static code analysis to further understand the specimen’s inner-workings. Perform dynamic code analysis...