Analysis of a Malware Specimen
Solutions in this Chapter
• Goals
• Guidelines for Examining a Malicious File Specimen
• Establishing the Environment Baseline
• Pre-execution Preparation: System and Network Monitoring
• Execution Artifact Capture: Digital Impression and Trace Evidence
• Executing the Malicious Code Specimen
• Execution Trajectory Analysis: Observing Network, Process, System Calls, and File System Activity
• Automated Malware Analysis Frameworks
• Embedded Artifact Extraction Revisited
• Interacting with and Manipulating the Malware Specimen: Exploring and Verifying Specimen Functionality and Purpose
• Event Reconstruction and Artifact Review: Post-run Data Analysis
• Digital Virology: Advanced Profiling through Malware ...
Get Malware Forensics Field Guide for Linux Systems now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.