Malware analysis (II) - Basic static analysis: strings and metadata
The day has come. It’s time to pick up where I left off months ago and continue with the series on malware analysis. This is the second part of an article series. In the previous article, I discussed the basics, different techniques for malware analysis, how to obtain samples, and some basic programs for conducting this type of analysis.
First of all, it’s important to remember the different types of analysis that exist.
Malware analysis (I) - How to get started in malware analysis
Note: some time ago I started this series of posts on basic malware analysis concepts, but for various reasons I put it on hold. Now I have decided to continue it, and this new version has a more updated content compared to the first posts I did at the time.
We are living in a world full of malware. Everyone has had a problem with some kind of virus or at least knows someone who has, and everyone knows or works in a company that has been attacked using some kind of malware.