As we have seen, the specific features of static malware analysis consist of the following:
- Verify that a given binary file is actually malicious.
- Identify as much information as possible about the binary file, without launching the execution and conducting the analysis on the basis of the characteristics that can be retracted, such as characteristics from the file format or from the resources stored in it.
- Catalog the suspicious binary file by calculating its hash, which constitutes its signature (this signature can also be shared within the malware analysts community, in order to update the overall knowledge base of malware threats).
- Without a doubt, static malware analysis, although rapid to conduct, presents ...