mirror of
https://github.com/aljazceru/securedorg.github.io.git
synced 2026-01-06 15:54:20 +01:00
adding av names
This commit is contained in:
BIN
RE102/images/Section2_AVnames.png
Normal file
BIN
RE102/images/Section2_AVnames.png
Normal file
Binary file not shown.
|
After Width: | Height: | Size: 169 KiB |
@@ -49,6 +49,8 @@ A string web search is a last resort. I usually use this step to find reports al
|
||||
## Anti-Virus Vendors ##
|
||||
AV Vendors provide some insight into a sample besides just good or bad. There are also many heuristic and generic detections that might not be useful in telling you what the sample is going to do. Keywords like Trojan or GEN for Generic are not enough to tell you how bad it is. However the keyword Injector gives us a hint that it is doing some kind of code in memory manipulation. As we know from above, this malware has a bunch of junk code, so AV might not have enough binary features to make a definitive signature but still does well in telling you that it looks generally abnormal.
|
||||
|
||||

|
||||
|
||||
## VM Detonation & Network Information ##
|
||||
If you followed [RE101 Lab 1](https://securedorg.github.io/RE101/section4/) you will know how to do a simple VM detonation to collect the filesystem, process, registry and network information. You will notice that this sample does nothing really special in the VM. So we will need to investigate why.
|
||||
|
||||
|
||||
Reference in New Issue
Block a user