Static-Dynamic Aalaysis
Static-Dynamic Aalaysis
Analysis -01
?What is the file type
Analysis -02
?Provide the cryptographic sha256 hash
Analysis -03
?Is the file packed/obfuscated
Choose correct answer YES or NO
Analysis -04
?Provide any interesting strings that indicates a plausible CnC URL
Analysis -05
Which library imports suggest the use of the network activity that URL
functions? (using PE)
Dynamic Analysis
Malware -01
?Does the malware have references to the downloader API calls
Give the full hierarchy of function call.Name of functions should be in format
:(Alphabetic order)
")(Name call1() - Name call1"
Malware -02
?What is the API call used by the malware to download the file
Malware -03
What is the name of the domain from where malware downloads malicious
?component
Malware -04
?What is the name of the executable that it downloads
Malware -05
?What is the full path on the disk where downloaded malware is dropped
Malware -06
)(What function execute the downloaded file? Example Answer:xxx
Malware -07
Based on your analysis , what is the functionality of the malware