Uncovering the capabilities of malicious software allows security professionals to respond to
incidents, fortify defenses, and derive threat intelligence. The malware analysis tips and tricks
outlined in this poster act as a starting point and a reminder for the individuals looking to
reverse-engineer and otherwise examine suspicious files such as compiled executables and
potentially malicious documents.
What threat does the malicious or suspicious artifact pose? What do its mechanics reveal
about the adversary’s goals and capabilities? How effective are the company’s security
controls against such infections? What security measures can strengthen the infrastructure
from future attacks of this nature? Malware analysis helps answer such questions critical to
an organization’s ability to handle malware threats and related incidents.
This poster brings together malware analysis resources related to:
This poster has been created as reference for the FOR610: Reverse-Engineering Malware: Malware Analysis Tools and Techniques course by DFIR Instructor, course author & SANS Faculty Fellow Lenny Zeltser