SlideShare a Scribd company logo
2
Most read
3
Most read
5
Most read
INTRODUCTION TO MALWARE
ANALYSIS
Hussein Muhaisen
AKA System Exploited
WHAT IS MALWARE ?
• Malware is a Binary that does
MaliciousActivities
• Malware is used by attackers to
perform malicious actions and gain
control over their targets or spying
on them
• RATS,Keyloggers , Ransomware.
These are all examples of malware
that are widely common and used
nowadays.
TYPES OF MALWARE
• Virus orWorm : Malware that is capable of copying itself
and spreading to other computers.A virus needs user
intervention,whereas a worm can spread without user
intervention
• Trojan : Malware that disguises itself as a regular program
to trick users to install it on their systems. Once installed,
it can perform malicious actions such as stealing sensitive
data, uploading files to the attacker's server, or monitoring
webcams
• Backdoor / Remote Access Trojan (RAT):This is a type of
Trojan that enables the attacker to gain access to and
execute commands on the compromised system
• Botnet:This is a group of computers infected with the
same malware (called bots), waiting to receive instructions
from the command-and-control server controlled by the
attacker. The attacker can then issue a command to these
bots, which can perform malicious activities such as DDOS
attacks.
• Ransomware: Malware that holds the system for ransom
by locking users out of their computer or by encrypting
their files.
• Rootkit: Malware that provides the attacker with privileged
access to the infected system and conceals its presence or
the presence of other software.
WHAT IS
MALWARE
ANALYSIS
• Malware analysis is the process
of analyzing a malware sample
and be able to exfiltrate as
much as information as possible
, malware analysis is really
important because by analyzing
how the malware functions ,
how it spreads , and the type
of malware used. Helps us
defend against future attacks
Static analysis
Dynamic analysis
Code analysis
Behavioral analysis
Static analysis is the Process of
Analyzing malware without
executing it the main goal is to
extract as much information as
possible. Example : Strings.
Dynamic analysis is the Process of
Analyzing the malware and how it
functions by executing it the
purpose if this process is to see
what the malware does and how it
behaves.
Code analysis is the process of
Reverse Engineering the
malware , basically this process
is analyzing how the malware
is written.
Behavioral analysis is the
process of monitoring the
malware after execution the
purpose of this process is to
monitor every process that
the malware modifies or
communicates to. Examples:
Registry Entries , and Network
Packets
WHAT’S NEXT ?
• Setup an Dedicated Isolated
Environment ForAnalyzing Malware
• LearnWindows Internals and Linux
Internals , and how Computers work
in general
• Learn / Understand Programming and
Mostly Assembly and C/C++ ,and
Java
• Understand Network Fundamentals
• UnderstandThe Operating System
Architecture
THANK YOU <3

More Related Content

PPT
Chapter 1 malware analysis primer
PDF
Malware Analysis
PPT
Counter Measures Of Virus
PPTX
Virus and its CounterMeasures -- Pruthvi Monarch
PPTX
Metasploit
PPTX
Malware forensic
PPTX
Viruses & security threats
PPTX
Ethical hacking introduction to ethical hacking
Chapter 1 malware analysis primer
Malware Analysis
Counter Measures Of Virus
Virus and its CounterMeasures -- Pruthvi Monarch
Metasploit
Malware forensic
Viruses & security threats
Ethical hacking introduction to ethical hacking

What's hot (20)

PPT
Types of attack -Part3 (Malware Part -2)
PPTX
Information Security (Malicious Software)
PPTX
Ethical hacking trojans, worms and spyware
PPTX
PPT
ETHICAL HACKING
PPTX
Anti Virus Software
PPT
intruders types ,detection & prevention
PDF
Know More about Your Enemies
PPTX
Intruders detection
PPT
Information Assurance And Security - Chapter 2 - Lesson 3
PPTX
Ethical hacking anti virus
PPTX
Lecture 10 intruders
PPT
Computer infections and protections(final)
PPTX
PPTX
Security
PPTX
Malware Classification and Analysis
PPTX
Virus and malware presentation
PPT
Intruders
PPTX
Malicious software
 
PPTX
Introduction to cyber security
Types of attack -Part3 (Malware Part -2)
Information Security (Malicious Software)
Ethical hacking trojans, worms and spyware
ETHICAL HACKING
Anti Virus Software
intruders types ,detection & prevention
Know More about Your Enemies
Intruders detection
Information Assurance And Security - Chapter 2 - Lesson 3
Ethical hacking anti virus
Lecture 10 intruders
Computer infections and protections(final)
Security
Malware Classification and Analysis
Virus and malware presentation
Intruders
Malicious software
 
Introduction to cyber security
Ad

Similar to Introduction to Malware analysis (20)

PPTX
Introduction To Malware Analysis.pptx
PPTX
Introduction To Malware Analysis.pptx
PDF
CH1- Introduction to malware analysis-v2.pdf
PDF
CHAPTER 1 MALWARE ANALYSIS PRIMER.pdf
PPT
CHAPTER 1 MALWARE ANALYSIS PRIMER.ppt
PPTX
PPTX
Malware Analysis Techniques &Incident Response.pptx
PPTX
Practical Malware Analysis: Ch 0: Malware Analysis Primer & 1: Basic Static T...
PDF
Malware Analysis for cyber security & Network Security
PDF
Basic survey on malware analysis, tools and techniques
PDF
CNIT 126 Ch 0: Malware Analysis Primer & 1: Basic Static Techniques
PPTX
Malware analysis
PDF
What Are The Types of Malware? Must Read
PDF
Mission Impossible - Malware Analysis.pdf
PPTX
Cyber Security Threats Unveilded
PDF
Unveiling the Shadows: A Comprehensive Guide to Malware Analysis for Ensuring...
PPTX
Type of Malware and its different analysis and its types !
PPTX
Malware and Anti-Malware Seminar by Benny Czarny
PPTX
Malware Detection Using Data Mining Techniques
PPT
Malware by Ms. Allwood
Introduction To Malware Analysis.pptx
Introduction To Malware Analysis.pptx
CH1- Introduction to malware analysis-v2.pdf
CHAPTER 1 MALWARE ANALYSIS PRIMER.pdf
CHAPTER 1 MALWARE ANALYSIS PRIMER.ppt
Malware Analysis Techniques &Incident Response.pptx
Practical Malware Analysis: Ch 0: Malware Analysis Primer & 1: Basic Static T...
Malware Analysis for cyber security & Network Security
Basic survey on malware analysis, tools and techniques
CNIT 126 Ch 0: Malware Analysis Primer & 1: Basic Static Techniques
Malware analysis
What Are The Types of Malware? Must Read
Mission Impossible - Malware Analysis.pdf
Cyber Security Threats Unveilded
Unveiling the Shadows: A Comprehensive Guide to Malware Analysis for Ensuring...
Type of Malware and its different analysis and its types !
Malware and Anti-Malware Seminar by Benny Czarny
Malware Detection Using Data Mining Techniques
Malware by Ms. Allwood
Ad

Recently uploaded (20)

PPTX
TechTalks-8-2019-Service-Management-ITIL-Refresh-ITIL-4-Framework-Supports-Ou...
PPTX
Chapter 5: Probability Theory and Statistics
PDF
Encapsulation theory and applications.pdf
PPTX
1. Introduction to Computer Programming.pptx
PDF
MIND Revenue Release Quarter 2 2025 Press Release
PPTX
Tartificialntelligence_presentation.pptx
PDF
WOOl fibre morphology and structure.pdf for textiles
PPTX
A Presentation on Artificial Intelligence
PDF
August Patch Tuesday
PPTX
TLE Review Electricity (Electricity).pptx
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PDF
Enhancing emotion recognition model for a student engagement use case through...
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PDF
Getting Started with Data Integration: FME Form 101
PDF
Assigned Numbers - 2025 - Bluetooth® Document
PDF
Hybrid model detection and classification of lung cancer
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PPTX
A Presentation on Touch Screen Technology
PDF
DASA ADMISSION 2024_FirstRound_FirstRank_LastRank.pdf
PDF
Microsoft Solutions Partner Drive Digital Transformation with D365.pdf
TechTalks-8-2019-Service-Management-ITIL-Refresh-ITIL-4-Framework-Supports-Ou...
Chapter 5: Probability Theory and Statistics
Encapsulation theory and applications.pdf
1. Introduction to Computer Programming.pptx
MIND Revenue Release Quarter 2 2025 Press Release
Tartificialntelligence_presentation.pptx
WOOl fibre morphology and structure.pdf for textiles
A Presentation on Artificial Intelligence
August Patch Tuesday
TLE Review Electricity (Electricity).pptx
Agricultural_Statistics_at_a_Glance_2022_0.pdf
Enhancing emotion recognition model for a student engagement use case through...
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
Getting Started with Data Integration: FME Form 101
Assigned Numbers - 2025 - Bluetooth® Document
Hybrid model detection and classification of lung cancer
Digital-Transformation-Roadmap-for-Companies.pptx
A Presentation on Touch Screen Technology
DASA ADMISSION 2024_FirstRound_FirstRank_LastRank.pdf
Microsoft Solutions Partner Drive Digital Transformation with D365.pdf

Introduction to Malware analysis

  • 1. INTRODUCTION TO MALWARE ANALYSIS Hussein Muhaisen AKA System Exploited
  • 2. WHAT IS MALWARE ? • Malware is a Binary that does MaliciousActivities • Malware is used by attackers to perform malicious actions and gain control over their targets or spying on them • RATS,Keyloggers , Ransomware. These are all examples of malware that are widely common and used nowadays.
  • 3. TYPES OF MALWARE • Virus orWorm : Malware that is capable of copying itself and spreading to other computers.A virus needs user intervention,whereas a worm can spread without user intervention • Trojan : Malware that disguises itself as a regular program to trick users to install it on their systems. Once installed, it can perform malicious actions such as stealing sensitive data, uploading files to the attacker's server, or monitoring webcams • Backdoor / Remote Access Trojan (RAT):This is a type of Trojan that enables the attacker to gain access to and execute commands on the compromised system • Botnet:This is a group of computers infected with the same malware (called bots), waiting to receive instructions from the command-and-control server controlled by the attacker. The attacker can then issue a command to these bots, which can perform malicious activities such as DDOS attacks. • Ransomware: Malware that holds the system for ransom by locking users out of their computer or by encrypting their files. • Rootkit: Malware that provides the attacker with privileged access to the infected system and conceals its presence or the presence of other software.
  • 4. WHAT IS MALWARE ANALYSIS • Malware analysis is the process of analyzing a malware sample and be able to exfiltrate as much as information as possible , malware analysis is really important because by analyzing how the malware functions , how it spreads , and the type of malware used. Helps us defend against future attacks
  • 5. Static analysis Dynamic analysis Code analysis Behavioral analysis Static analysis is the Process of Analyzing malware without executing it the main goal is to extract as much information as possible. Example : Strings. Dynamic analysis is the Process of Analyzing the malware and how it functions by executing it the purpose if this process is to see what the malware does and how it behaves. Code analysis is the process of Reverse Engineering the malware , basically this process is analyzing how the malware is written. Behavioral analysis is the process of monitoring the malware after execution the purpose of this process is to monitor every process that the malware modifies or communicates to. Examples: Registry Entries , and Network Packets
  • 6. WHAT’S NEXT ? • Setup an Dedicated Isolated Environment ForAnalyzing Malware • LearnWindows Internals and Linux Internals , and how Computers work in general • Learn / Understand Programming and Mostly Assembly and C/C++ ,and Java • Understand Network Fundamentals • UnderstandThe Operating System Architecture