Malware Hunting and Analysis Labs

SCENARIO INFORMATION

DESCRIPTION:

This scenario requires the analysis of a malicious PDF file and has 2 virtual machines:

– Windows 10 Pro – Victim machine

– Windows 2016 Server – Analysis machine

OBJECTIVES AND OUTCOME:

After completing the scenario you will be able to:

– Analyze PDF files and extract binary data from streams

– Familiarize with Portable Executable (PE) basic concepts

– Familiarize with Portable Executable (PE) basic static analysis

PRE–REQUISITES:

In order to get the full benefit of this scenario, it is suggested that you have competencies in the following areas:

– Basic malware analysis concepts

RECOMMENDED READING:

There is no recommended reading for this scenario.

AUTHOR:

This scenario was created by Gichuki Jonia.

MODE SINGLEPLAYER
Type CYBER CHALLENGE
DIFFICULTY INTERMEDIATE
TIME 4 HOURS

Start Scenario

RegisterLogin

Other Scenarios

Facebook
Twitter
LinkedIn
Reddit
WhatsApp
Telegram
Scroll to Top

Introducing Threat-eX™

6-Event Cyberdrill Program

Threat-eX™ is a comprehensive 6-month program of Live Webinars and CYBER RANGES simulations, delivering effective, threat-informed operations training, professional development and certification