This Report is going to be in two phases;

  1. Basic Static Analysis and;
  2. Basic Dynamic Analysis

Tools:

Basic Static Analysis Methodology

1. Fingerprinting

It is important to note that for Static Analysis, we DO NOT EXECUTE the Malware Binary

This is done to understanding the features /characteristics of what the malware could be doing

Steps

  1. Pull the SHA256 hash for this particular malware sample - using Cmder

  2. Pull the MD5 hash

    λ sha256sum.exe putty.exe
    # OUTPUT
    # 0c82e654c09c8fd9fdf4899718efa37670974c9eec5a8fc18a167f93cea6ee83 *putty.exe - SHA256 HASH
    
    λ md5sum.exe putty.exe
    # 334a10500feb0f3444bf2e86ab2e76da *putty.exe - MD5 HASH
    
  3. Check the malware and if its been known/has any digital signatures in the real world - using VirusTotal

    https://www.virustotal.com/

image.png

2. String Extraction

Strings & FLOSS

Strings: An array of characters

Floss pulls the strings out of the binary and decodes/de-obfuscates any strings it finds

floss.exe putty.exe > floss.txt
#to make it easier to analyze the floss strings

image.png