Incident Response Training, Basic Malware Analysis – Day 21

Incident Response Training, Basic Malware Analysis – Day 21

HomeBlackPerlIncident Response Training, Basic Malware Analysis – Day 21
Incident Response Training, Basic Malware Analysis – Day 21
ChannelPublish DateThumbnail & View CountDownload Video
Channel AvatarPublish Date not found Thumbnail
0 Views
In this complete series we will talk about incident response and it will be a free training course for everyone. Today is day 21 and we will talk about the essential steps that every incident responder must know to perform a malware analysis.

Once you know the manual process, we need to automate the whole game as well. And that's where Intezer comes in. Intezer automates security operations by simulating the complex decision-making process and threat analysis skills of experienced analysts.
Integrate it with your existing workflows (EDR, SOAR, SIEM, etc.) to automate the analysis and reverse engineering of potential threats while streamlining alert triage, incident response, and threat hunting.
Sign up today – https://analyze.intezer.com/

Malware analysis is a very extensive topic that requires a lot of patience, knowledge, skills and much more. Also, it requires a lot of time if we really want to go deep into the code level of analysis and read or understand the actual code at the assembly level. But in incident response or security operations, most of the time during analysis we also need to know some basic steps that initiate decision making and determine the next steps for a particular incident. For example:

We need to know what type/family of malware it is.
What are its static properties
Any interesting strings or IOCs hidden in the example.
How does the sample behave
What is the TTP and MITRE attribution of the malware family
All quickly identifiable IOCs after running the example

In today's episode, we're going to cover it all. We're going to take some malware examples and explain everything.

So watch the whole episode if you want to become the BOSS of your SOC!!

Related Episodes-
—————————————————————————————————————-
1. Create your lab – https://youtu.be/zyjwo8z3PtU
2. Malware Analysis Bootcamp – https://youtu.be/D3inDM8kM-Y

CHECK OUT THE PLAYLIST BELOW if you are interested in pursuing a career in DFIR and Security Operations!!
—————————————————————————————————————-
INCIDENT RESPONSE TRAINING – Full Course https://youtube.com/playlist?list=PLjWEV7pmvSa4yvhzNsCjOJovOn1LLyBXB
Free DFIR tools and techniques https://youtube.com/playlist?list=PLjWEV7pmvSa6f-NTpXsaUYWZLjLAB_0TS
Windows and Memory Forensics https://youtube.com/playlist?list=PLjWEV7pmvSa50erciZUSnzvE7nK0FyvsH
Malware Analysis https://youtube.com/playlist?list=PLjWEV7pmvSa6u32RongesgDtkfKBfrFWW
SIEM tutorial https://youtube.com/playlist?list=PLjWEV7pmvSa7cXTkCppnYHERUdy8Dd71x
Threat Hunting and Threat Intelligence https://youtube.com/playlist?list=PLjWEV7pmvSa5UTZlsWp5wRnURNbeMS-fu

Timelines
—————————————————————————————————————-
0:00 ⏩ Introduction
1:22 ⏩ Static analysis – pestudio
6:21 ⏩ Static Analysis – Dental Floss
8:58 ⏩ Static Analysis Capacity
10:34 ⏩ Dynamic Analysis
18:13 ⏩ Automation with Intezer
21:17 ⏩ Detecting and hunting with Intezer
23:19 ⏩ Scan suspicious machine with Intezer
27:17 ⏩ Integration with EDR, SOAR, SIEM
31:03 ⏩ Summary

FOLLOW ME EVERYWHERE-
—————————————————————————————————————-
LinkedIn: https://www.linkedin.com/company/blackperl
You can also reach me personally via LinkedIn: https://bit.ly/38ze4L5
Twitter: @blackperl_dfir
Git: https://github.com/archanchoudhury
Insta: (blackperl_dfir)https://www.instagram.com/blackperl_dfir/
Reachable via [email protected]

SUPPORT FOR BLACKPERL
—————————————————————————————————————-
╔═╦╗╔╦╗╔═╦═╦╦╦╦╗╔═╗
║╚╣║║║╚╣╚╣╔╣╔╣║╚╣═╣
╠╗║╚╝║║╠╗║╚╣║║║║║═╣
╚═╩══╩═╩═╩═╩╝╚╩═╩═╝
️ SUBSCRIBE, Share, Like, Comment
Buy me a coffee https://www.buymeacoffee.com/BlackPerl
Sponsorship inquiries: [email protected]

—————————————————————————————————————
Thanks for watching! Be cyber aware!

Please take the opportunity to connect with your friends and family and share this video with them if you find it useful.