The Best Online Cybersecurity Training in the World - SANS OnDemand

Webcasts

To attend this webcast, login to your SANS Account or create your Account.

Powering IR/SOC with Code Reuse Detection - The Emotet Case Study

  • Friday, September 21st, 2018 at 1:00 PM EDT (17:00:00 UTC)
  • Matt Bromiley & Itai Tevet
This webcast has been archived. You can view the webcast presentation and download the slides by logging into your SANS Portal Account or creating an Account. Click the Register Now button after you have logged in to view the Webcast.

Sponsor

  • Intezer

You can now attend the webcast using your mobile device!

Overview

In the software development world, engineers frequently use ready-made code for various tasks. On the darker side of things, malware authors follow in the same path. Why write your own code when existing code is prevalent and easy to use? A phenomenon we see time and time again and one that proves beneficial in detecting malicious intent.

In this webinar, we will demonstrate how finding code reuse of known malware with Intezer Analyze enables you to improve malware analysis and detection, walking through the most common banking malware, Emotet, as a case study.

Speaker Bios

Matt Bromiley

Matt Bromiley is a SANS digital forensics and incident response (IR) instructor, teaching FOR508 Advanced Incident Response, Threat Hunting, and Digital Forensics and SANS FOR572 Advanced Network Forensics: Threat Hunting, Analysis, and Incident Response. He is also an IR consultant at a global IR and forensic analysis company, combining experience in digital forensics, log analytics, and incident response and management. His skills include disk, database, memory and network forensics; incident management; threat intelligence and network security monitoring. Matt has worked with organizations of all shapes and sizes, from multinational conglomerates to small, regional shops. He is passionate about learning, teaching and working on open source tools.


Itai Tevet

Itai is Intezer's CEO. His passion for cyber security started when he served as the head of IDF CERT, the Israeli Defense Force's Cyber Incident Response team, where he led an elite group of cyber security professionals in digital forensics, malware analysis, incident response and reverse engineering.

Need Help? Visit our FAQ page or email webcast-support@sans.org.

Not able to attend a SANS webcast? All Webcasts are archived so you may view and listen at a time convenient to your schedule. View our webcast archive and access webcast recordings/PDF slides.