Malware Analysis
Malware Analysis
Welcome!
Who is this course for?
● Anyone willing and dedicated to learning malware analysis.
● You do not need to have prior knowledge, if you do, it will
be helpful.
○ Data Exfiltration
MZ Header/DOS Header
Defines the file as an executable binary
DOS Stub
(Program cannot be run in DOS Prints a message when run in DOS (Exists for
mode) compatibility)
PE File Header (Signature)
Defines the executable as a PE
Why is it important?
● Attackers can utilize the resources section to store more malicious files
and data like payloads, droppers, configuration info etc.
● The resource section is also useful as it may contain information about
the origin of the malware.
Tools we will be using
● Pestudio
● Resource Hacker