
Cheatsheet
Table of Contents
Analysis Workflow Overview
┌─────────────────────────────────────────────────────────────┐
│ MALWARE TRIAGE │
│ • File type identification │
│ • Hash calculation (MD5, SHA1, SHA256) │
│ • VirusTotal/malware bazaar lookup │
│ • Initial assessment of threat level │
└────────────────────┬────────────────────────────────────────┘
│
▼
┌─────────────────────────────────────────────────────────────┐
│ STATIC ANALYSIS │
│ • Strings extraction │
│ • PE header analysis (Windows) │
│ • ELF analysis (Linux) │
│ • Packed/obfuscated detection │
│ • Import/export table analysis │
└────────────────────┬────────────────────────────────────────┘
│
▼
┌─────────────────────────────────────────────────────────────┐
│ DYNAMIC ANALYSIS │
│ • Behavioural monitoring │
│ • API call tracing │
│ • File system modifications │
│ • Registry changes │
│ • Network communications │
└────────────────────┬────────────────────────────────────────┘
│
▼
┌─────────────────────────────────────────────────────────────┐
│ DEEP DIVE ANALYSIS │
│ • Code analysis/reverse engineering │
│ • Unpacking │
│ • Deobfuscation │
│ • Memory forensics │
└────────────────────┬────────────────────────────────────────┘
│
▼
┌─────────────────────────────────────────────────────────────┐
│ IOC EXTRACTION & REPORTING │
│ • Document findings │
│ • Extract indicators of compromise │
│ • MITRE ATT&CK mapping │
│ • Generate signatures/rules │
└─────────────────────────────────────────────────────────────┘Lab Setup & Safety
Critical Safety Rules
REMnux Setup
FLARE-VM Setup
Static Analysis
Phase 1: Initial Triage
Phase 2: Strings Analysis
Phase 3: PE Analysis (Windows Executables)
Phase 4: Unpacking Detection and Handling
Dynamic Analysis
Phase 1: Behavioural Monitoring Setup
Phase 2: Process Monitoring
Phase 3: API Call Monitoring
Phase 4: Network Analysis
Phase 5: Execution in Sandbox
Memory Analysis
Capturing Memory
Memory Analysis with Volatility
Network Analysis
Protocol Analysis
NetworkMiner Analysis (FLARE-VM)
Malware Type-Specific Workflows
1. Ransomware Analysis
2. Trojan/RAT Analysis
3. Spyware/Infostealer Analysis
4. Dropper/Downloader Analysis
5. Document-Based Malware (Maldocs)
6. Fileless Malware Analysis
Tool Reference Guide
REMnux Essential Tools
Tool
Purpose
Basic Usage
FLARE-VM Essential Tools
Tool
Purpose
Basic Usage
Quick Command Reference
IOC Extraction & Reporting
Indicator Types
Automated IOC Extraction
YARA Rule Creation
Creating Snort/Suricata Rules
Report Template
Malware Analysis Report
Executive Summary
Sample Information
Key Findings
Technical Analysis
Static Analysis
Dynamic Analysis
Capabilities
Indicators of Compromise (IOCs)
Network Indicators
File Indicators
Behavioural Indicators
MITRE ATT&CK Mapping
Recommendations
Detection Rules
Appendix
Advanced Techniques Bypassing Anti-Analysis
Code Analysis with Ghidra
Automated Analysis with Capa
Quick Reference Checklists
Initial Triage Checklist
Static Analysis Checklist
Dynamic Analysis Checklist
Report Checklist
Common Pitfalls and Best Practices
Safety Best Practices
Analysis Best Practices
Resources and Further Learning
Essential Resources
Training Resources
Community
Last updated