Malware Analysis

Post image
Malware Analysis Lab — Secure Sample Acquisition (Sacrificial VM Method)
This walkthrough demonstrates how to safely acquire malware samples using a temporary sacrificial virtual machine and transfer the encrypted sample into an isolated Windows 10 FLARE VM for analysis, minimizing exposure to the host system.
Read More
Post image
Malware Analysis — f.exe (Dynamic and Static Analysis Walkthrough)
A detailed static and dynamic malware analysis of f.exe demonstrating keylogger and trojan behavior, including persistence mechanisms, obfuscated PowerShell execution, and suspicious C2-related network activity mapped to MITRE ATT&CK techniques.
Read More
Post image
Malware Analysis Lab (LetsDefend | SOC Analyst Path)
This walkthrough documents setting up a secure Windows malware analysis VM with FLARE-VM and conducting both static and dynamic malware analysis using industry tools to identify file type, behavior, persistence mechanisms, and potential network activity. The lab emphasizes safe configuration, snapshotting, and methodical analysis techniques suitable for beginner SOC and malware analysts.
Read More

Popular Posts