PaulDotCom mailing list archives
Analyzing Malware Binary
From: a.qarta at gmail.com (Aa'ed Alqarta)
Date: Thu, 10 Sep 2009 22:43:14 +0300
Hi, I'd like to get some samples and analyze them. (You can compress them and use a password, then upload them to rapidshare) On Thu, Sep 10, 2009 at 3:14 PM, <infolookup at gmail.com> wrote:
Hello All I recently came across several infected machine on one of a network I support. This got me thinking instead of always cleaning the machine and moving on I would like to start understanding the various downloaded binary that aided in the infection. Can someone recommend a good source or briefly explain how you would start such an analysis. So far I tried PEid but it was unable to identify the packer used, next I used strings and piped the output to a text file, I can post the out if anyone is interested. Thank You. Sent from my Verizon Wireless BlackBerry _______________________________________________ Pauldotcom mailing list Pauldotcom at mail.pauldotcom.com http://mail.pauldotcom.com/cgi-bin/mailman/listinfo/pauldotcom Main Web Site: http://pauldotcom.com
-- Best Regards, ---------------------------------------------------------- http://extremesecurity.blogspot.com http://www.linkedin.com/in/aalqarta http://www.experts-exchange.com/M_3011930.html -------------- next part -------------- An HTML attachment was scrubbed... URL: http://mail.pauldotcom.com/pipermail/pauldotcom/attachments/20090910/3894bdad/attachment.htm
Current thread:
- Analyzing Malware Binary infolookup at gmail.com (Sep 10)
- Analyzing Malware Binary Aa'ed Alqarta (Sep 10)