Question: Malware Forensics - Report Example I am looking for just examples of any Malware Analysis (Preferably done thru command in Linux) I understand I may
Malware Forensics - Report Example
I am looking for just examples of any Malware Analysis (Preferably done thru command in Linux)
I understand I may not get full solution for below intrsuctions but anything related to this would be helpful:
Instructions:
Deliverable: You are to conduct your analysis and to provide a written report (.doc or .pdf format ONLY).
You should have an overview section, written in non technical terms, that describes the purpose of the software, as well as the legal implications of someone having the software and using it on a computer (or multiple computers) or network. Provide an example or two (e.g., from reports on the Internet) that describe how this software has been used. This section should be titled "Analysis Overview."
The second part of the paper should be a complete, specific, and detailed explanation of the results of your static and dynamic analysis. DO NOT include ALL of the results for the longer, more detailed results (e.g., lsof and strace), but a few screen shots that point out the 'interesting' parts of the results that assisted you in identifying what the software does (open ports? open files? etc.). This section should be titled 'Technical Section.' For each command you run you need to describe a) what you were doing; b) why you were doing it (what was the objective?); and c) an interpretation of the results. If you just provide me with a screen capture of your command and results, with NO interpretation, you get zero credit. (Imagine your Dr. giving you your lab blood results and saying 'here, read these,' without interpreting them. Interpretation matters, you are the expert!
Provide a thorough and clearly understandable report covering both static and dynamic analysis. Note that in my report I explained a) what I was doing, b) why I was doing it, and c) an interpretation of the results for each command.
Step by Step Solution
There are 3 Steps involved in it
Get step-by-step solutions from verified subject matter experts
