3 STATIC AND DYNAMIC CODE ANALYSIS

While initial triage, automated sandboxing, and behavioral analysis are essential steps in understanding an unknown malware sample, sometimes you need to dig deeper, down to the code level. Maybe you’re experiencing problems getting the sample to run in a sandbox or VM environment, or perhaps you’re trying to identify any hidden capabilities. Whatever your reasons, this chapter will walk you through static and dynamic code analysis techniques you can use to reverse engineer a malware sample and discover its true intentions.

We’ll start with a brief introduction to assembly code, a fundamental concept for ...

Get Evasive Malware now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.