Table of Contents
Preface
Section 1: Basic Techniques
Chapter 1: Creating and Maintaining your Detonation Environment
Technical requirements
Setting up VirtualBox with Windows 10
Downloading and verifying VirtualBox
Installing Windows 10
Installing the FLARE VM package
Isolating your environment
Maintenance and snapshotting
Summary
Chapter 2: Static Analysis – Techniques and Tooling
Technical requirements
The basics – hashing
Hashing algorithms
Obtaining file hashes
Avoiding rediscovery of the wheel
Leveraging VirusTotal
Getting fuzzy
Picking up the pieces
Malware serotyping
Collecting strings
Challenges
Challenge 1
Challenge 2
Summary
Further reading
Chapter 3: Dynamic Analysis – Techniques and Tooling
Technical requirements
Detonating your ...
Get Malware Analysis Techniques now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.