MA-01 — Emerging Malware Analysis News/Intel

4 years ago 205
BOOK THIS SPACE FOR AD
ARTICLE AD

@mikecybersec

Aug 31

·

2

min read

Image for post

Image for post

https://dribbble.com/shots/785543-IE-legacy-warning

GoLang based malware has been known to spike since the beginning of 2019 and poses a big threat to even experienced Malware Analysts. There are over 53 known malware families known using this language and it is very flexible. Read about it here: https://unit42.paloaltonetworks.com/the-gopher-in-the-room-analysis-of-golang-malware-in-the-wild/

Malwology wrote this article (He’s a SANS610 instructor). He covers some very good Python based tools for statically analysing PE’s, some of those that seem unconventional compared to your current arsenal of tools. He also covers a cool piece on extracting embedded Executables within the ‘Overlay’ Section of Portable Executables, using a PE carving tool in REMnux.

https://malwology.com/2016/02/09/remnux-v6-for-malware-analysis-part-2-static-file-analysis/

Tool created by Intezer packed with YARA rules following analysis of 3.5 million pieces of code, shared between the Russian APT samples.

https://apt-ecosystem.com/russia/detector

https://www.intezer.com/blog-russian-apt-ecosystem/

https://resources.malwarebytes.com/files/2019/01/Malwarebytes-Labs-2019-State-of-Malware-Report-2.pdf

https://www.youtube.com/watch?v=u_Mbh8r7L0E

https://www.fireeye.com/blog/threat-research/2019/09/open-sourcing-stringsifter.html

https://github.com/fireeye/stringsifter/blob/master/README.md

https://blog.nviso.be/2019/09/18/malicious-spreadsheet-dropping-a-dll/

https://newtonpaul.com/static-malware-analysis-with-ole-tools-and-cyber-chef/

Read Entire Article