Главная
Study mode:
on
1
Intro
2
What is malware analysis
3
Lockheed Martin kill chain
4
Automating malware analysis
5
My research
6
What does Neutrino do
7
What is Tequila Boom Boom
8
Command and Control
9
Yana Rules
10
Vti Notification
11
Python Code
12
Viper API
13
The Bad Guys
14
Coincidences
15
Multiple Patterns
16
C2 Clusters
17
Funsies
18
Pivoting
19
Questions
Description:
Explore automated malware analysis techniques for threat intelligence in this 45-minute conference talk from BSides Augusta 2016. Delve into the Lockheed Martin kill chain, learn about tools like Neutrino and Tequila Boom Boom, and discover how to leverage Yara rules, VTI notifications, and the Viper API. Examine command and control structures, identify patterns in malicious activities, and understand pivoting strategies. Gain insights into the world of cybercriminals and coincidences in their operations, while enhancing your ability to detect and respond to emerging threats.

Automating Malware Analysis for Threat Intelligence

Add to list
0:00 / 0:00