Skip to content

ASHDEX/practical-malware-analysis-

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

5 Commits
 
 
 
 
 
 

Repository files navigation

Practical Malware Analysis

Lab exercises and study notes for Practical Malware Analysis by Michael Sikorski and Andrew Honig, supplemented with the RPISEC Malware course materials. Covers static and dynamic analysis, unpacking, anti-analysis techniques, and reverse engineering of real-world malware samples.

Lab Structure

Directory Description
Lab1 PE file static analysis — imports, exports, strings, and section analysis
Labs Dynamic analysis exercises — behavioral monitoring, API tracing, and network analysis

Topics Covered

Static Analysis

  • PE header analysis: MZ signature, section characteristics, import/export tables
  • String extraction and entropy analysis for packed samples
  • YARA rule development from static indicators
  • IDA Pro / Ghidra disassembly workflow
  • Identifying compiler artifacts and packer signatures

Dynamic Analysis

  • Sandboxed execution with behavioral monitoring (Process Monitor, Process Hacker)
  • API call tracing with tools: API Monitor, x64dbg, WinDbg
  • Network traffic capture and protocol identification (Wireshark, INetSim)
  • Registry and filesystem change monitoring

Anti-Analysis Bypass

  • Debugger detection bypass (patching IsDebuggerPresent, ScyllaHide)
  • Packer identification and manual unpacking workflow
  • Anti-VM evasion techniques and mitigation
  • Code obfuscation: XOR decoding, stack string reconstruction

Malware Categories Analyzed

  • Keyloggers and credential stealers
  • Backdoors and remote access trojans (RATs)
  • Downloader/dropper chains
  • Rootkits: user-mode and kernel-mode persistence

Tools Reference

Tool Purpose
IDA Pro / Ghidra Static disassembly and decompilation
x64dbg / WinDbg Dynamic debugging
Process Monitor Filesystem, registry, and process activity
Wireshark / INetSim Network traffic capture and simulation
FLARE VM Pre-configured malware analysis environment
PEStudio PE file static analysis

Reference

Author

ASHDEX — Security Researcher & Architect | Malware Analysis · Reverse Engineering ashdex.com

About

practice based on PMA and RPI SEC course

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

 
 
 

Contributors