September 2024
Intermediate to advanced
488 pages
13h 29m
English

While initial triage, automated sandboxing, and behavioral analysis are essential steps in understanding an unknown malware sample, sometimes you need to dig deeper, down to the code level. Maybe you’re experiencing problems getting the sample to run in a sandbox or VM environment, or perhaps you’re trying to identify any hidden capabilities. Whatever your reasons, this chapter will walk you through static and dynamic code analysis techniques you can use to reverse engineer a malware sample and discover its true intentions.
We’ll start with a brief introduction to assembly code, a fundamental concept for ...