R&D's R&D
Socials
  • General
    • About Me
    • Some information about the content of this blog
  • MMO
    • So, I'm doing an MMO
    • Weekly updates
      • Weekly update #1
      • Week 2 through 5 updates
      • Weekly update #6
      • Weekly update #7
      • Weekly update #8
      • Weekly update #?
  • Reverse engineering
    • Beginner's guide to reverse engineering
      • Intro to the subject
      • An introduction to x86 assembly
    • HackTheBox Cyber Apocalypse 2024
      • BoxCutter analysis write-up
  • Malware Analysis
    • Intro to the subject
    • Sample Triage Checklist
    • Process of analysis
      • Sample Triage
  • Malware development
    • Beginner's guide to malware development
      • Intro to the subject
    • What I'm learning
      • Bypassing conditional statements.
Powered by GitBook
On this page

Was this helpful?

  1. Malware Analysis

Intro to the subject

Imagine you're sitting at your desk at work, and your co-worker sends you an application. Your co-worker states that this application ( an .exe file), automates some of your job, allowing you to . Excited, you open it aaaaaaaaaand nothing happens. Later on, someone from IT contacts you and asks if you've downloaded or opened anything out of the ordinary application today

PreviousBoxCutter analysis write-upNextSample Triage Checklist

Last updated 1 year ago

Was this helpful?