Malware Analysis
Malware in common use today is extraordinarily complex. This complexity derives from the malware’s function: rootkit, botnet, keylogger, etc. as well as from the great lengths the authors go to in order to obscure that function. Obfuscation can be in the form of packers, code-level manipulations, detecting debuggers and sandboxes, and a nearly limitless number of other techniques. Two main types of analysis are typically used: static analysis which looks at the malicious binary (e.g., exe file) itself, and dynamic analysis which looks at the running malicious executable and its effect on the live system. Our security analysts leverage these techniques as well as other hybrid approaches to determine function and intent of malware, and report these results back to you.
- Determine the function of malicious code/programs
- Use a mix of static and dynamic analysis and reverse engineering
Contact us about Malware Analysis