Case Study & Practice: Malware analysis

[fusion_builder_container type=”flex” hundred_percent=”no” hundred_percent_height=”no” hundred_percent_height_scroll=”no” align_content=”stretch” flex_align_items=”flex-start” flex_justify_content=”flex-start” hundred_percent_height_center_content=”yes” equal_height_columns=”no” container_tag=”div” hide_on_mobile=”small-visibility,medium-visibility,large-visibility” status=”published” border_style=”solid” box_shadow=”no” box_shadow_blur=”0″ box_shadow_spread=”0″ gradient_start_position=”0″ gradient_end_position=”100″ gradient_type=”linear” radial_direction=”center center” linear_angle=”180″ background_position=”center center” background_repeat=”no-repeat” fade=”no” background_parallax=”none” enable_mobile=”no” parallax_speed=”0.3″ background_blend_mode=”none” video_aspect_ratio=”16:9″ video_loop=”yes” video_mute=”yes” absolute=”off” absolute_devices=”small,medium,large” sticky=”off” sticky_devices=”small-visibility,medium-visibility,large-visibility” sticky_transition_offset=”0″ scroll_offset=”0″ animation_direction=”left” animation_speed=”0.3″ filter_hue=”0″ filter_saturation=”100″ filter_brightness=”100″ filter_contrast=”100″ filter_invert=”0″ filter_sepia=”0″ filter_opacity=”100″ filter_blur=”0″ filter_hue_hover=”0″ filter_saturation_hover=”100″ filter_brightness_hover=”100″ filter_contrast_hover=”100″ filter_invert_hover=”0″ filter_sepia_hover=”0″ filter_opacity_hover=”100″ filter_blur_hover=”0″][fusion_builder_row][fusion_builder_column type=”1_1″ type=”1_1″ align_self=”auto” content_layout=”column” align_content=”flex-start” valign_content=”flex-start” content_wrap=”wrap” center_content=”no” target=”_self” hide_on_mobile=”small-visibility,medium-visibility,large-visibility” sticky_display=”normal,sticky” order_medium=”0″ order_small=”0″ hover_type=”none” border_style=”solid” box_shadow=”no” box_shadow_blur=”0″ box_shadow_spread=”0″ background_type=”single” gradient_start_position=”0″ gradient_end_position=”100″ gradient_type=”linear” radial_direction=”center center” linear_angle=”180″ background_position=”left top” background_repeat=”no-repeat” background_blend_mode=”none” filter_type=”regular” filter_hue=”0″ filter_saturation=”100″ filter_brightness=”100″ filter_contrast=”100″ filter_invert=”0″ filter_sepia=”0″ filter_opacity=”100″ filter_blur=”0″ filter_hue_hover=”0″ filter_saturation_hover=”100″ filter_brightness_hover=”100″ filter_contrast_hover=”100″ filter_invert_hover=”0″ filter_sepia_hover=”0″ filter_opacity_hover=”100″ filter_blur_hover=”0″ animation_direction=”left” animation_speed=”0.3″ last=”no” border_position=”all” min_height=”” link=””][fusion_title title_type=”text” rotation_effect=”bounceIn” display_time=”1200″ highlight_effect=”circle” loop_animation=”off” highlight_width=”9″ highlight_top_margin=”0″ title_link=”off” link_target=”_self” content_align=”left” size=”3″ text_shadow=”no” text_shadow_blur=”0″ gradient_font=”no” gradient_start_position=”0″ gradient_end_position=”100″ gradient_type=”linear” radial_direction=”center center” linear_angle=”180″ style_type=”default” animation_direction=”left” animation_speed=”0.3″ hide_on_mobile=”small-visibility,medium-visibility,large-visibility” sticky_display=”normal,sticky”]

Case Study & Practice: Malware analysis

[/fusion_title][fusion_text rule_style=”default” animation_direction=”left” animation_speed=”0.3″ hide_on_mobile=”small-visibility,medium-visibility,large-visibility” sticky_display=”normal,sticky”]

“Case Study & Practice: Malware analysis” is the custom made class provided by idCARE.UI. That means the class design, modules, and contents are developed originally by idCARE.UI.

In this class, malware analysis training will teach participants
about:

  • Build an isolated and controlled laboratory environment to analyze code and behaviour of malicious programs
  • Use network and system monitoring tools to check how malware interacts with file systems, the registry, networks, and other processes in a Windows environment
  • Reveal and analyze malicious JavaScript and other components of web pages, which are often used by exploit kits for drive by attacks
  • Control the relevant aspects of malicious program behaviour through network traffic interception and code patching to carry out effective malware analysis
  • Use disassembler and debugger to check how dangerous Windows executables work
  • Ignores various packages and other defense mechanisms designed by malware makers to direct, confuse, and slow down analysts.
  • Recognize and understand common assembly level patterns in malicious code, such as L code injection, API hooks, and anti-analysis steps

[/fusion_text][fusion_code]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[/fusion_code][/fusion_builder_column][/fusion_builder_row][/fusion_builder_container]