EvilZone
Hacking and Security => Tutorials => : Axon October 21, 2012, 08:01:33 PM
-
A paper dealing with static analysis of malware, in this paper you will learn to Determine extent of infection, network risk, determine risk of data exposure, figure out infection vector and propagation methods, etc.
-
Part 1 of 2? So this is incomplete upload?
-
Part 1 of 2? So this is incomplete upload?
This paper has been released in 2012, the second part has not been released yet. This is a complete paper covering the subject of static analysis, for dynamic analysis, you can wait for the second part or search the web. There are plenty of papers.
-
Oh ok, sorry then Axon, I thought it was an upload split in halves. Thanks.
-
Very nice work Axon and thanks for sharing this valuable information. +1
One dump question though, why stay anonymous during investigation of a malicious domain?
-
Staying anonymous is essential for all malware research. Why is that? for several reasons:
- You do not want your information to show up in their logs. That ties you back to you and your organization.
- If they can identify you, you can spoil your own research. When they profile you (and consider they might see you first than you to them), they'll most likely block anything related to you, making it harder to yourself the research.
- Last but not least, they can retaliate at you. E.g.: Storm Worm started a DDoS attack to those systems that scanned them.
Can't think of more reasons right now, but that should be enough for now. ::)
-
Yes that make sense, that's enough for me :)
Thank you for the reply.