0% found this document useful (0 votes)
12 views3 pages

Static-Dynamic Aalaysis

Uploaded by

MAJID ABDULLAH
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
12 views3 pages

Static-Dynamic Aalaysis

Uploaded by

MAJID ABDULLAH
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 3

:Static Analysis

Analysis -01
?What is the file type

Analysis -02
?Provide the cryptographic sha256 hash

Analysis -03
?Is the file packed/obfuscated
Choose correct answer YES or NO

Analysis -04
?Provide any interesting strings that indicates a plausible CnC URL

Analysis -05
Which library imports suggest the use of the network activity that URL
functions? (using PE)
Dynamic Analysis

Malware -01
?Does the malware have references to the downloader API calls
Give the full hierarchy of function call.Name of functions should be in format
:(Alphabetic order)
")(Name call1() - Name call1"

Malware -02
?What is the API call used by the malware to download the file

Malware -03
What is the name of the domain from where malware downloads malicious
?component

Malware -04
?What is the name of the executable that it downloads

Malware -05
?What is the full path on the disk where downloaded malware is dropped

Malware -06
)(What function execute the downloaded file? Example Answer:xxx

Malware -07
Based on your analysis , what is the functionality of the malware

You might also like