2022-01-07 09:50:40 +00:00
|
|
|
# Malware-Analysis
|
|
|
|
A curated list of awesome malware analysis tools and resources
|
2022-01-07 10:17:52 +00:00
|
|
|
|
|
|
|
### Types of Malware Attacks
|
|
|
|
<table id="tablepress-2">
|
|
|
|
<thead>
|
|
|
|
<tr>
|
|
|
|
<th><center>Type</center></th>
|
|
|
|
<th><center>What It Does</center></th>
|
|
|
|
<th><center>Real-World Example</center></th>
|
|
|
|
</tr>
|
|
|
|
</thead>
|
|
|
|
<tbody>
|
|
|
|
<tr>
|
|
|
|
<td><center>Ransomware</center></td>
|
|
|
|
<td><center>disables victim's access to data until ransom is paid</center></td>
|
|
|
|
<td><center>RYUK</center></td>
|
|
|
|
</tr>
|
|
|
|
<tr>
|
|
|
|
<td><center>Fileless Malware</center></td>
|
|
|
|
<td><center>makes changes to files that are native to the OS</center></td>
|
|
|
|
<td><center>Astaroth</center></td>
|
|
|
|
</tr>
|
|
|
|
<tr>
|
|
|
|
<td><center>Spyware</center></td>
|
|
|
|
<td><center>collects user activity data without their knowledge</center></td>
|
|
|
|
<td><center>DarkHotel</center></td>
|
|
|
|
</tr>
|
|
|
|
<tr>
|
|
|
|
<td><center>Adware</center></td>
|
|
|
|
<td><center>serves unwanted advertisements</center></td>
|
|
|
|
<td><center>Fireball</center></td>
|
|
|
|
</tr>
|
|
|
|
<tr>
|
|
|
|
<td><center>Trojans</center></td>
|
|
|
|
<td><center>disguises itself as desirable code</center></td>
|
|
|
|
<td><center>Emotet</center></td>
|
|
|
|
</tr>
|
|
|
|
<tr>
|
|
|
|
<td><center>Worms</center></td>
|
|
|
|
<td><center>spreads through a network by replicating itself</center></td>
|
|
|
|
<td><center>Stuxnet</center></td>
|
|
|
|
</tr>
|
|
|
|
<tr>
|
|
|
|
<td><center>Rootkits</center></td>
|
|
|
|
<td><center>gives hackers remote control of a victim's device</center></td>
|
|
|
|
<td><center>Zacinlo</center></td>
|
|
|
|
</tr>
|
|
|
|
<tr>
|
|
|
|
<td><center>Keyloggers</center></td>
|
|
|
|
<td><center>monitors users' keystrokes</center></td>
|
|
|
|
<td><center>Olympic Vision</center></td>
|
|
|
|
</tr>
|
|
|
|
<tr>
|
|
|
|
<td><center>Bots</center></td>
|
|
|
|
<td><center>launches a broad flood of attacks</center></td>
|
|
|
|
<td><center>Echobot</center></td>
|
|
|
|
</tr>
|
|
|
|
<tr>
|
|
|
|
<td><center>Mobile Malware</center></td>
|
|
|
|
<td><center>infects mobile devices</center></td>
|
|
|
|
<td><center>Triada</center></td>
|
|
|
|
</tr>
|
|
|
|
</tbody>
|
|
|
|
</table>
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
### Which programming languages should I learn?
|
|
|
|
* Python
|
|
|
|
* C++
|
|
|
|
* Assembly
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
### Books
|
|
|
|
* [Practical Malware Analysis](https://www.amazon.co.uk/Practical-Malware-Analysis-Hands-Dissecting/dp/1593272901/)
|
|
|
|
* [Practical Reverse Engineering: x86, x64, ARM, Windows Kernel, Reversing Tools, and Obfuscation](https://www.amazon.co.uk/Practical-Reverse-Engineering-Reversing-Obfuscation/dp/1118787315)
|