Skip to Content
Malware Analysis Techniques
book

Malware Analysis Techniques

by Dylan Barker
June 2021
Intermediate to advanced
282 pages
5h 18m
English
Packt Publishing
Content preview from Malware Analysis Techniques

Chapter 10: Malicious Functionality: Mapping Your Sample to MITRE ATT&CK

In previous chapters, we've discussed monitoring for behaviors, statically reviewing file information, and de-obfuscating code in order to ascertain what behaviors a piece of adversarial software may undertake in its journey to take action on objectives on our networks.

In this chapter, we'll discuss how to utilize MITRE's famous ATT&CK framework in order to both better understand what each step the malicious code takes is attempting to achieve and to allow us to better categorize, classify, and report on the various samples of malware we may uncover during the course of our career as malware analysts.

Once we've covered each of these points, you'll also have a chance to ...

Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Practical Malware Analysis

Practical Malware Analysis

Michael Sikorski, Andrew Honig
Advanced Malware Analysis

Advanced Malware Analysis

Christopher Elisan

Publisher Resources

ISBN: 9781839212277Supplemental Content