Malware
13/05/2022
Forensics
Cyber Security
GENC Muhammed
STUDENT NUMBER: 20021350
, Table of Contents
Abstract:................................................................................................................................................2
Introduction:..........................................................................................................................................2
How Malware forensics work:...............................................................................................................2
How Malware Is Detected:....................................................................................................................3
Prerequisites for Malware Analysis:......................................................................................................4
Types of Malware Analysis:...................................................................................................................4
Malware Forensics Stages:....................................................................................................................4
Case Study (Wireshark):.........................................................................................................................5
Malware Analysis Using Wireshark:...................................................................................................6
Device Model and OS from HTTP Traffic:...........................................................................................7
Locating Malware:.................................................................................................................................8
Ursnif Traffic:.....................................................................................................................................9
Trickbot Traffic:................................................................................................................................10
Comparison Table of Other Tools:.......................................................................................................10
Legal and Ethical Consideration:..........................................................................................................11
Malware Analysis Landscape:..............................................................................................................11
Why Malware Analysis is Critical for Cyber Security Posture:..............................................................12
Conclusion:..........................................................................................................................................12
References:..........................................................................................................................................13