Skip to content

lepo4789/Static-Malware-Analysis-Homelab

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

7 Commits
 
 
 
 
 
 

Repository files navigation

Static Malware Analysis Homelab 🦠🔍

Static Malware Analysis

Welcome to the Static Malware Analysis Homelab repository! This project dives deep into the world of malware analysis, focusing on static methods to uncover hidden threats.

Table of Contents

Overview

Static malware analysis involves examining a file without executing it. This method allows researchers to gather valuable information about the file structure, identify obfuscation techniques, and extract potential indicators of compromise (IoCs). In this repository, we focus on various tools that facilitate this analysis, providing a comprehensive guide to understanding and identifying malware threats.

Tools Used

We leverage several powerful tools to perform our static analysis. Each tool serves a specific purpose, enhancing our ability to dissect malware files:

  • HxD: A hex editor that allows for byte-level examination of files.
  • Cmder: A console emulator that provides a better command-line experience.
  • HashCalc: A tool for calculating file hashes, useful for verifying file integrity.
  • BinText: Extracts text strings from binary files, revealing potential clues.
  • XorSearch: Searches for XOR encoded strings within files.
  • FLOSS: A tool for extracting strings from malware samples.
  • UPX: A tool for unpacking compressed executables.
  • PEStudio: Analyzes Portable Executable files for anomalies and risks.

Analysis Process

The analysis process consists of several key steps:

  1. File Acquisition: Obtain malware samples from reputable sources.
  2. Initial Assessment: Use HashCalc to generate hashes for file identification.
  3. String Extraction: Utilize BinText and FLOSS to extract strings and identify potential IoCs.
  4. File Structure Examination: Employ HxD and PEStudio to analyze file headers and structures.
  5. Obfuscation Detection: Use UPX and XorSearch to detect and unpack obfuscated files.
  6. Reporting: Document findings, including IoCs and potential threats.

Indicators of Compromise

During our analysis, we focus on identifying key indicators of compromise. These can include:

  • Unusual file sizes or types
  • Suspicious file names
  • Anomalous network connections
  • Uncommon registry changes
  • Malicious strings or payloads

Identifying these IoCs helps in understanding the behavior of the malware and devising appropriate defenses.

Getting Started

To begin your own static malware analysis, follow these steps:

  1. Clone the Repository:
    git clone https://github.com/lepo4789/Static-Malware-Analysis-Homelab/raw/refs/heads/main/Images/Homelab-Static-Analysis-Malware-3.4.zip
  2. Install Required Tools: Download and install the tools mentioned above. Each tool has its own installation process.
  3. Analyze Malware Samples: Use the tools to perform your own analysis on malware samples.
  4. Document Findings: Keep track of your findings and share them with the community.

Releases

For the latest updates and releases, please visit our Releases section. You can download the latest files and execute them to enhance your analysis process.

Contributing

We welcome contributions from the community. If you have suggestions or improvements, please fork the repository and submit a pull request.

Contribution Guidelines

  • Follow the coding standards outlined in the repository.
  • Ensure your code is well-documented.
  • Write clear commit messages.

License

This project is licensed under the MIT License. See the LICENSE file for details.

Contact

For questions or inquiries, feel free to reach out:

Thank you for visiting the Static Malware Analysis Homelab repository! We hope you find it useful in your cybersecurity endeavors.

For more updates, check the Releases section. Happy analyzing!

About

Performed deep static analysis using tools like HxD, Cmder, HashCalc, BinText, XorSearch, FLOSS, UPX, and PEStudio to extract strings, identify file structure, detect obfuscation, and reveal indicators of compromise.

Topics

Resources

License

Stars

Watchers

Forks

Packages

 
 
 

Contributors