Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.

Fundamental of malware analysis

418 views

Published on

How to analyst malware and how to write the report.

Published in: Technology
  • Be the first to comment

Fundamental of malware analysis

  1. 1. Fundamental of Malware Analysis Sumedt Jitpukdebodin Senior Security Researcher
  2. 2. Topic
  3. 3. Topic • Objective of Malware Analysis • Method of Malware Analysis • Report
  4. 4. Objective of Malware Analysis
  5. 5. Objective of Malware Analysis • Statistic of file • Behaviour • OS Behaviour • Network Behaviour
  6. 6. Method of Malware Analysis
  7. 7. Method of Malware Analysis • Static Analysis • Dynamic Analysis • Automatic Analysis
  8. 8. Static Analysis • Disassemble Malware • Ollydbg (reverse engineering) • IDA Pro (reverse engineering) • gdb (reverse engineering) • PeStudio (Static File Analysis) • Strings (Static File Analysis) • File Insight (Static File Analysis) • etc.
  9. 9. Dynamic Analysis • Behaviour after running • Process Monitor • Process Explorer • Wireshark • RegShot • Process Hacker • Volatility • TCPView • FakeNet • etc.
  10. 10. Automatic Analysis • malwr.com • Norman Sandbox • GFI Sandbox • Anubis • ThreatExpert.com • Comodo • Vicheck • Ceasar
  11. 11. Report
  12. 12. Report • Statistic of malware • How it can spreading • How it can persistent • How it use network • How to defend it
  13. 13. End.

×