How to trick malware so it perceives the sandbox as a regular user computer?
How should be the malware analysis VM set up?
host-only networking mode and segmented from the internet
What steps should you go through when creating a VM for malware analysis?
What questions should you answer during a static analysis?
Which three tools are used for file type identification?
What does TrID analyze in order to determine the actual file format?
the actual data within the file to determine its format
How is TrID useful in malware analysis?
analyze unknown or suspicious files
On which platform is TrID primarily used?
Windows
How to use TrID?
How are cryptographic hashes used in malware analysis?
What is the name of a an app that can calculate several different cryptographic hashes for a file?
Compute Hash
What is the tool from Microsoft used to analyze strings?
Strings
Does Strings extract both ASCII and Unicode strings at the same time?
yes
What is the minimum strings length by default in Strings?
3