Analyse a given sample of malware

Assignment Help Computer Engineering
Reference no: EM133109407

Cyber Crime Malware

Static & Dynamic Malware Analysis

Introduction
The aim of this assessment is to analyse a given sample of malware, using static & dynamic analysis methods and write a detailed report. The sample is available on Moodle in zip format (password: infected).

Report
You are required to document the complete analysis of the sample. You can break it down into two main areas, i.e., static and dynamic analysis. You could have sub-sections in these areas, e.g., in dynamic analysis you can have file system, registry, and network activities as separate sections. For each section, you should list the tools you used (bullet points). Also, if the tools used require specific configuration, briefly explain what you did and give reasons for this. For example, in Process Monitor, you could mention the filters you applied (and why) to monitor specific processes.

- Static Analysis: A thorough investigation of the suspect binary in a non-running state. You must document all steps clearly.

- Dynamic Analysis: Running the malware in a virtual machine. Make sure that you have made a clean baseline snapshot (with all tools installed and configured), before you run the malware. Use the tools to monitor the malware's behaviour in the file system, registry, and network. Report on your findings.

Attachment:- Cyber Crime Malware.rar

Reference no: EM133109407

Questions Cloud

Explain atkinson flexible firm model : Please explain Atkinson flexible firm model short and clear with evidence and citation . Please help to add on Singapore Deliveroo with citation and evidence
Prepare the journal entry to adjust interest expense : Amount owing in the accounts payable ledger was $5,000. Prepare the journal entry to adjust interest expense as at 30 June 2022
Systems perspective of employment relations : In terms of the systems perspective of employment relations is the following viewed as system outputs.
Construct a sequence of logical reasons : Message Strategies: Proposals [LO-7] Think of a course you would love to see added to the curriculum at your school. Conversely, if you would like to see a cour
Analyse a given sample of malware : Analyse a given sample of malware, using static & dynamic analysis methods and write a detailed report - thorough investigation of the suspect binary
Examples of closed-ended questions : What are some examples of closed-ended questions and why would we use those?
Prepare journal entries to record all the transactions : The building will be depreciated using the straight-line method of depreciation. Prepare journal entries to record all the transactions of JFG Ltd
Developing a job description for position : Participate in the class discussion exercise on the following topic: Your neighbor, who has just retired from the military in the security field (Military Polic
Provide recommendation to resolve the issue : Provide recommendation(s) to resolve the issue(s). Explain why your suggestions will help the company to resolve the issue(s).

Reviews

Write a Review

Computer Engineering Questions & Answers

  Your job is to made a risk-management policy which

you have just been hired as an information security engineer for a large multi-international corporation. unfortunately

  Identify the key problems and issues in the case study

Identify the key problems and issues in the case study. Formulate and include a thesis statement, summarizing the outcome of your analysis in 1-2 sentences.

  Be substantive and clear and use illustrations to reinforce

write 400-600 words that respond to the following questions with your thoughts ideas and comments. this will be the

  Discuss now considering expanding internationally

A merged company continues to grow. More stores have been added and Internet sales are growing. The company is now considering expanding internationally

  How to write a robust business continuity plan

Research and provide your recommendations be for the Business Continuity Management Team (BCMT) for Wilmington University Library?

  What will the host do with the packet

The replay window spans from 200 to 263. What will the host do with the packet? What is the window span after this event?

  Define the emerging cyber security technologies

How do the emerging cyber security technologies that you identified coupled with prioritized research and development improve cyber security?

  Draw an automaton that recognizes precisely

Draw an automaton that recognizes precisely the following language: strings, from the alphabet {a, b}, which contain a substring with at least 2 consecutive b's

  Solve the problem using qm for windows

A LP problem has three constraints: 2X + 10Y ≤ 100; 4X + 6Y ≤ 120; 6X + 3Y ≤ 90 and the non-negativity constraints. The objective is to Maximize X. Solve the problem using QM for Windows

  What is the maximum value of n for which program produces

You need to write and run the program using MARIE simulator. Please include appropriate comments to make your code readable.

  How to convert the ff phrase into programming notation

how to Convert the ff phrase into programming notation

  Valuate user dialog strategies used by menu-driven interface

Evaluate the user dialog strategies used by a menu-driven interface. Determine why menu-driven interfaces continue to be popular in the modern computing age.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd