0% found this document useful (0 votes)
79 views2 pages

Malware Analysis

There are two main types of malware analysis: static analysis, which examines malware code or binaries without running it to identify functionality and potential impact, and dynamic analysis, which runs malware in a controlled environment to observe and provide detailed information about its interactions and behavior.

Uploaded by

Edmar Samortin
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
79 views2 pages

Malware Analysis

There are two main types of malware analysis: static analysis, which examines malware code or binaries without running it to identify functionality and potential impact, and dynamic analysis, which runs malware in a controlled environment to observe and provide detailed information about its interactions and behavior.

Uploaded by

Edmar Samortin
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 2

Malware analysis is a critical task in understanding and mitigating cyber threats.

Malware, short for malicious software, is any software designed to harm or exploit a
computer system. It can take many forms, such as viruses, trojans, worms, and
ransomware, and can be used to steal sensitive information, disrupt operations, and
even destroy data.

There are two main types of malware analysis: static and dynamic. Static analysis is
the process of analyzing malware without running it, typically by examining the code
or binary of the malware sample. This type of analysis is useful for identifying the
functionality of the malware and determining its potential impact, but it may not
reveal all of its behavior.

Dynamic analysis, on the other hand, involves running the malware sample in a
controlled environment and observing its behavior. This type of analysis can reveal
how the malware interacts with the system, such as which files and processes it
accesses, and can provide detailed information about its functionality.

Basic Static

 string search
 binwalk
 hex viewers
 clamav

Basic Dynamic
Virtualization for sandboxing

 VirtualBox
 VMWare Player
 KVM
 Docker
 Kubernetes
 LXC/LXD

Advanced Static/Dynamic
APKTool
https://youtu.be/017pMX8otf8

https://youtu.be/KDGlADCPuTc

https://youtu.be/fTGTnrgjuGA

https://youtu.be/dW8YFRX2BGk
https://youtu.be/oW8Ey5STrPI

https://youtu.be/Rem2mVjaZYo

https://youtu.be/NbJ3xk3eoNE

You might also like