Which teams perform malware analysis?
What are the rules for handling malware in a safe environment?
How are executable files often called?
binary or PE (Portable Executable) file
What happens during static malware analysis?
malware is analyzed without being executed
What are some of the examples of static malware analysis tasks?
What happens during dynamic malware analysis?
running the malware in a VM, either in a manual fashion with tools installed to monitor the malware’s activity or in the form of sandboxes that perform this task automatically
What is the Linux distribution built for malware analysis?
Remnux VM
Which command is used to detect the actial file type in Linux?
file
Which Linux command lists down the printable strings present in a file?
strings {filename}
What can the strings command reveal?
embedded text such as URLs, file paths, error messages, Windows API calls or even specific keywords
What can’t be breached when uploading malware sample to a third party malware analyzer?
confidentiality (malware may contain sensitive information specific to a targeted company)
Which Linux command is used to calculate an MD5 checksum?
md5sum
What Linux command is used to find out what’s the access, modify, change and potentially birth time of a file?
stat
What do most PE files use to perform bulk of their jobs?
Windows API
What is entropy?
measure of randomness or unpredictability in a dataset, such as a file or network traffic
What is high entropy usually associated to?
encrypted or compressed data, where the content appears random and lacks obvious patterns or structure
Why is entropy important for malware analysis?
analyzing the entropy of files can help identify potential malware, especially in file formats that are not typically highly randomized, like executable files
Which Linux tool is used for PE file analysis?
pecheck
What is the name of a GUI-based tool used to analyze PE files?
pe-tree
What is the entropy value range?
typically range from 0 to 8, corresponding to the number of bits in a byte
What are Low Entropy values? What do they suggest?
What are Medium Entropy values? What do they suggest?
What are High Entropy Values? What do they suggest?
Which open-source sandbox is the most widely known sandbox in the malware analysis community?
Cuckoo’s Sandbox