Skip to Content
Malware Analysis Techniques
book

Malware Analysis Techniques

by Dylan Barker
June 2021
Intermediate to advanced
282 pages
5h 18m
English
Packt Publishing
Content preview from Malware Analysis Techniques

Chapter 4: A Word on Automated Sandboxing

In the last chapter, we discussed utilizing PowerShell to automate some of the common tasks for incident response and triage related to malware. As we learned, utilizing scripting can greatly assist an analyst in collecting pertinent information and making informed decisions quickly.

In this chapter, we'll take those ideas one step further, and examine some of the common fully automated, public, or private malware analysis frameworks that are available to us as analysts and that may speed up our triage even further – without even committing time to scripting for each incident.

We'll examine the IOCs we can collect with a known sample of malware, and then present a challenge at the end of the chapter ...

Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Practical Malware Analysis

Practical Malware Analysis

Michael Sikorski, Andrew Honig
Advanced Malware Analysis

Advanced Malware Analysis

Christopher Elisan

Publisher Resources

ISBN: 9781839212277Supplemental Content