DIGITAL FORENSICS
Malware Analysis
To have answers, you just need to know how to read them
>_ What to expect
The service involves a thorough examination of software to understand its behavior in detail and define the damage it can cause.
This activity is essential for determining the extent of a computer incident following the initial response phase.
>_ Operational Modes
Malware Sample Collection:
-
Phase 1: Involves collecting the malware itself.
This can be obtained from sources such as suspicious emails,
infected websites, compromised systems.
-
Dynamic and Behavioral Analysis: In this phase, the malware is executed
in a controlled environment, known as a sandbox, to observe its
real-time behavior.
-
Static Analysis: The malware's binary code is statically analyzed
to identify its functionalities and generate potential indicators of
compromise (IOCs).
-
Report Generation: At the end of the analysis activity,
a technical report is produced describing the evidence collected
during the analysis: useful for understanding the risk the client
faced in the event of a potential infection.
EXTRACTION
Sample Acquisition
Search and extraction of the sample from volatile memory or the file system.
SANDBOX
Dynamic Analysis
Filesystem interactions, network connections, system calls (...).
REVERSE ENGINEERING
Static Analysis
Reverse engineering of functions and creation of indicators of compromise (IOCs).
REPORT
Description
Detailed description of the software and its level of danger. Recommendations for prevention and removal.