Главная
Study mode:
on
1
Olympic Destroyer - Quick behavioural Analysis of this Wiper Malware
2
Analysing Obfuscated VBA - Extracting indicators from a Trickbot downloader
3
Analysing an Emotet Downloader with CMD Watcher and CyberChef
4
WannaCry Ransomware - Revisited. Behavioural and Static Analysis Techniques
5
Live Stream - Part 2 - Emotet Downloader Analysis
6
Live Stream - Finding Emotet's Config
7
Excel 4.0 Macros Analysis - Cobalt Strike Shellcode Injection
8
COVID19 Malware - Getting Closer to the Bad Guys
9
Crack The BAT - Identifying Compression, Packers & Googling for IOCs
10
Wrangle with Hangul - Analysis of a malicious hwp document
11
SUNBURST SolarWinds Malware - Tools, Tactics and Methods to get you started with Reverse Engineering
12
SUNBURST SolarWinds RECON - Malware Reverse Engineering, OSINT and Identifying Victims
13
SUPERNOVA - Everything you need to know to Reverse Engineer an APT WebShell
14
JNLP Dangers - Java Malware Detection & Analysis
15
Remcos Config - Using RC4 to Get Command & Control from CyberChef
16
How to STEAL $1bn - A look at the Bangladesh Bank Heist
17
Clubhouse Malware - Analysis of an Agent Tesla Infection Campaign
18
JavaScript Malware - How bad can it be?
19
Kaseya Ransomware Attack - 5 Key Insights into this Malware campaign
20
NSO Pegasus Malware - How Governments spy on any phone
21
Was it Really North Korea? Tools and Techniques to Attribute Malware Campaigns to Nation States
Description:
Dive into the world of malware analysis through a comprehensive 8-hour course covering a wide range of real-world threats. Explore Olympic Destroyer wiper malware, analyze obfuscated VBA in Trickbot downloaders, and dissect Emotet malware using CMD Watcher and CyberChef. Revisit WannaCry ransomware with behavioral and static analysis techniques, and delve into Excel 4.0 macros for Cobalt Strike shellcode injection. Investigate COVID-19-related malware, crack BAT files, and analyze Hangul documents. Learn reverse engineering techniques for SUNBURST SolarWinds malware, SUPERNOVA WebShell, and Java-based threats. Uncover the methods behind the Bangladesh Bank heist, examine Clubhouse malware and JavaScript threats, and gain insights into the Kaseya ransomware attack. Study the NSO Pegasus malware used for government surveillance and explore tools for attributing malware campaigns to nation-states.

Malware Analysis

Add to list
0:00 / 0:00