Contact Sales
Contact Sales

Malware Magic: Revealing Intel Leads Without Reverse Engineering

Malware Magic: Revealing Intel Leads Without Reverse Engineering (PDF, 2.31MB)Last updated: 27 Jan, 2026
Presented by:
Christina Johns
Christina Johns

When most people think of malware analysis, what typically comes to mind are complex disassemblers and a maze of indecipherable assembly code. However, there are some great community tools that can provide actionable insights without reverse engineering.

This talk will cover how to find valuable data for Intelligence analysis without a deep dive into disassembly. Often this initial information can allow you to deepen your threat analysis picture and provide additional pivot points to run with.

If you work as an Intel analyst, you probably already do some malware analysis, but don’t realize it. And if you don’t (but would like to), we will discuss the tools and knowledge you should focus on first to effectively incorporate malware analysis into your threat intelligence workflows, without needing to memorize the Intel x86 manual.

SANS Cyber Threat Intelligence Summit 2026