O'Reilly logo

Advanced Malware Analysis by Christopher Elisan

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

CHAPTER10

The Proper Way to Handle Files

 

Understanding the Portable Executable (PE) file is a must, as you saw in the previous chapter. You were able to discover the different characteristics of the PE file and what makes it tick. With this newfound basic knowledge of PE files, you are now better equipped to understand Windows malware.

When it comes to malware inspection, you always start with an unknown file. You have no idea, at first, whether the file is malicious. Therefore, it is important to handle the file with great care to avoid any unwanted incidents that might lead to a malware outbreak.

In this chapter, I will discuss how to properly handle unknown files. You will look at the file’s analysis life cycle, from transport to storage, ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required