Memory Forensics with Volatility | PDF Malware Analysis with Any.Run | Cyber Incident Response

Поділитися
Вставка
  • Опубліковано 8 чер 2024
  • In this video walkthrough, we covered a cyber incident response case study that involved a malicious PDF malware delivered through a phishing email. The PDF malware once opened, spawned a powershell session in a hidden window that execute a base64 encoded command to retrieve another malicious file from a C2 server. We extracted the sample using Volatility plugins then we uploaded the sample to Virustotal and Any.run to dynamically analyze the malware and extract the related artifacts.
    ****
    Receive Cyber Security Field, Certifications Notes and Special Training Videos
    / @motasemhamdan
    *****
    Register and start analyzing malwares with Any.run
    app.any.run/?...
    ******
    Writeup
    motasem-notes.net/en/memory-f...
    ********
    Google Profile
    maps.app.goo.gl/eLotQQb7Dm6ai...
    LinkedIn
    [1]: / motasem-hamdan-7673289b
    [2]: / motasem-eldad-ha-bb424...
    Instagram
    / dev.stuxnet
    Twitter
    / manmotasem
    Facebook
    / motasemhamdantty

КОМЕНТАРІ • 3

  • @Voiceee-ix8zn
    @Voiceee-ix8zn Місяць тому

    great video, showcasing anyrun!

  • @anonymousking9797
    @anonymousking9797 Місяць тому

    Share your note with me, so that's I can get more resources ❤