In this short course, we covered various aspects of malware analysis. We explained static malware analysis, analyzing hashes and strings, analyzing portable executable header, packed malware samples, analysis using online scanner, using YARA rules for malware analysis, dynamic malware analysis, using process explorer and lastly reverse engineering a sample using Ghidra.

Please watch the video at the bottom for full detailed explanation of the walkthrough.

Malware Analysis Study Notes

OSCP Study Notes

Course Contents

  • Intro to static malware analysis
  • String and hash analysis
  • Portable executable analysis
  • Analyzing packers
  • Malware analysis with YARA rules.
  • Intro to dynamic malware analysis
  • Dynamic malware analysis with process explorer
  • Reverse engineering with Ghidra

Intro to malware analysis

When learning or even conducting malware analysis, a lab setup for malware analysis requires the ability to save the state of a machine (snapshot) and revert to that state whenever required. The machine is thus prepared with all the required tools installed, and its state is saved. After analyzing the malware in that machine, it is restored to its clean state with all the tools installed. This activity ensures that each malware is analyzed in an otherwise clean environment, and after analysis, the machine can be reverted without any sustained damage.
Following these steps ensures that your VM is not contaminated with remnants of previous malware samples when analyzing new malware. It also ensures that you don’t have to install your tools again and again for each analysis.

1.  Create a fresh Virtual Machine with a new OS install
2.  Set up the machine by installing all the required analysis tools in it
3.  Take a snapshot of the machine
4.  Copy/Download malware samples inside the VM and analyze it
5.  Revert the machine to the snapshot after the analysis completes

Full Video Course

About the Author

Mastermind Study Notes is a group of talented authors and writers who are experienced and well-versed across different fields. The group is led by, Motasem Hamdan, who is a Cybersecurity content creator and YouTuber.

View Articles