Behavior patterns and analysis

For a forensic network investigator, it is important to find the behavior and network patterns of a malware. Consider that you have received a few binaries (executable) and their hashes (signature) from the incident response team that are likely to be carrying malware. However, the analysis on PE/COFF executable is generally done by malware analysts and reverse engineers. What can you do with the PE executable? You don't have to study reverse engineering and malware analysis overnight to analyze the sample.

Consider that you have received the file hash as ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa. You can use websites such as https://www.virustotal.com/gui/home/upload and https://www.hybrid-analysis.com/ ...

Get Hands-On Network Forensics now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.