FAUN — Developer Community 🐾

We help developers learn and grow by keeping them up with what matters. 👉 www.faun.dev

Follow publication

Member-only story

Methodology for Malware Static analysis (1): Portable Executable (PE) files

Adetomiwa
FAUN — Developer Community 🐾
4 min readJan 28, 2022

--

Malware analysis determines if a program/file is malicious. There are two phases in malware analysis.

Fig 1.0: Process chart for Malware Analysis

Obtain malware sample:

There’s a number of online resources you can get malware samples from

Please remember that these are live and dangerous malware!

Do NOT run them unless you are absolutely sure of what you are doing!

They are to be used only for educational purposes only in a controlled and segmented sandbox environment!!!

What is static malware analysis?

Static analysis examines a malware program/file without execution. This provides the safest way to analyse malware without infecting your system. Static analysis extracts information from malware without viewing the code. Metadata such as libraries, file type, resources, and strings can yield clues about the nature of the malware. Hashes — MD5, SHA-1, SHA-256 — can be researched in OSINT to determine if the malware has been previously analysed or identified by antivirus engines. In this post, I’ll share my methodology (alongside popular tools) for static analysis.

Some questions to ask during static analysis:

  • Is this file malicious?
  • What type of file is this?
  • Has anyone already analysed this file?
  • What can be identified in the embedded strings?
  • Is this file packed or unpacked?
  • What can be identified in the PE header of the file?

Methodology & Tools used:

--

--

Published in FAUN — Developer Community 🐾

We help developers learn and grow by keeping them up with what matters. 👉 www.faun.dev

Written by Adetomiwa

The adventures of the solitary talkative

No responses yet

Write a response