Before the Tutorial

Overview

What does Malware Analysis have to do with Document Engineering?

Those concerned with Malware Analysis tend to ask a lot of the same questions that our Document Engineering community have been working with for years, such as:


Tools of the Trade

Platform-specific Utilities

Static Analysis: Disassemblers and Such

We can demonstrate IDA Pro, but before using IDA, a triage step using pestudio (among other choices) is in order.

Dynamic Analysis

But the programs acts differently when being debugged...since the file is still where it was. Can we figure out how the file deletes itself on termination? Or how it knows to behave differently when being debugged?


Malware Analysts Write Reports

Malware Analysis in the Large vs. Malware Analysis in the Small

For Further Study