Главная
Study mode:
on
1
Intro
2
About Me
3
Disclaimer
4
My Wife
5
Agenda
6
Objectives
7
Sandboxing
8
Starting with unknown samples
9
Creating an awesome spreadsheet
10
Cuckoo sandbox reports
11
Feature Vectors
12
Feature Vector Duck Pie
13
Behavior Summary
14
Project Overview
15
Pruning Vector
16
Retrieve Vectors
17
Family Plot
18
Family Group Plot
19
Family Group Tubing
20
Archetypes
21
Tight Features
22
Best Guest Up High
23
Output
24
Quiz
25
Scan
26
Example
27
Next Steps
28
Questions
Description:
Explore malware analysis techniques and sandbox evasion strategies in this 41-minute conference talk from Derbycon 2015. Dive into the world of unknown samples, feature vectors, and behavior summaries as Mike Schladt demonstrates how to create effective spreadsheets for analysis. Learn about Cuckoo sandbox reports, family plotting, and archetype identification. Discover methods for pruning vectors, retrieving data, and generating meaningful outputs. Gain insights into best practices for malware detection and analysis, including practical examples and next steps for implementation. Engage with a quiz to test your understanding and participate in a Q&A session to deepen your knowledge of advanced malware analysis techniques.

Break Me20 Stretching the Sandbox with Malware Feature Vectors

Add to list
0:00 / 0:00