Introduction To Malware & Malware Analysis
This module provides a foundational overview of malware analysis, aimed at enabling SOC analysts to perform essential malware analysis tasks, particularly focusing on Windows-based malware.
Types of Malware
Viruses: Infect host files and spread by attaching to legitimate programs.
Worms: Self-replicating, spread autonomously over networks.
Trojans: Disguised as legitimate software, create backdoors for unauthorized access.
Ransomware: Encrypts data and demands ransom for decryption keys.
Spyware: Collects user data without consent, tracking activities or capturing credentials.
Adware: Displays intrusive ads and may collect browsing data.
Botnets: Networks of compromised devices used for attacks or malware distribution.
Rootkits: Gain control over OS components, concealing malicious activity.
Backdoors/RATs: Enable remote access and prolonged control of a compromised system.
Droppers: Carry additional malware payloads, ensuring stealthy installation.
Information Stealers: Focused on stealing sensitive data like passwords and PII.
Malware Samples Resources
For malware research, handling samples should be done in secure, controlled environments. Notable sources include:
VirusShare
Hybrid Analysis
TheZoo (GitHub)
Malware-Traffic-Analysis.net
VirusTotal
ANY.RUN
Contagio Malware Dump
VX Underground
Malware/Evidence Acquisition
During investigations, disk imaging and memory acquisition tools are vital. Recommended tools include:
Disk Imaging Tools
FTK Imager: Widely used for creating disk images.
OSFClone: Open-source, supports multiple file systems.
DD/DCFLDD: Command-line tools on Unix-based systems, with forensic-focused features.
Memory Acquisition Tools
DumpIt: Simple tool for memory dumps on Windows and Linux.
MemDump: Command-line utility for RAM capture.
Belkasoft RAM Capturer: Effective for Windows systems, even with anti-debugging.
Magnet RAM Capture: User-friendly tool by Magnet Forensics.
LiME: Linux Memory Extractor, effective for volatile memory acquisition.
Additional Evidence Acquisition
KAPE: Targeted artifact collection, quick analysis.
Velociraptor: Host-based incident response tool using Velocidex Query Language (VQL).
Malware Analysis: Definition, Purpose, & Techniques
Malware Analysis is the study of malware to understand its behavior, origin, and impact. This helps in detection, reverse engineering, behavioral analysis, and threat intelligence gathering.
Goals of Malware Analysis
Detection and Classification: Identifying and categorizing malware to develop detection rules.
Reverse Engineering: Disassembling code to understand functionality, encryption, and control infrastructure.
Behavioral Analysis: Observing malware’s interactions with systems (e.g., file changes, network connections).
Threat Intelligence: Gathering attacker tactics, techniques, and malware origins.
Common Malware Analysis Techniques
Static Analysis: Analyzing malware code without execution to gain initial insights.
Dynamic Analysis: Executing malware in a controlled environment to observe behavior.
Code Analysis: Reverse engineering code to understand structure and functionality.
Memory Analysis: Examining system memory to detect runtime modifications.
Malware Unpacking: Extracting hidden code from packed malware to reveal actual functions.
Last updated