Analysis
Last updated
Last updated
As listed previously in the Malware section, the analysis process is very tricky, and you must have a strong fundamental understanding of the Windows operating system. I am not a pro; I'm just some random guy on the internet. The first thing that we will begin with is setting up a virtual environment. In my case, I will be setting up my VM with ProxMox. We will be setting up our environment with Flare VM; this is a script that comes preinstalled with a lot of free tools that help with RE(reverse engineering). You can find the documentation for it on the official GitHub page, and there they have all the steps you need to set up your flareVm
Now that you have your VM setup, it should look like this when it is fully installed.
Flare comes with a variety of tools, View the full list on their GitHub repo. As you can see from the image above, you can see that the internet is Enabled, and the first thing you are going to want to do is turn off internet access. You do not want the malware to affect any other devices on your network. The next thing we will be looking at is analysis using different tools. But first, it is important to go through the tools section and understand what they all do.
Now that you have everything set up, you are now ready to being your journey of malware analysis.