Malware Analysis

Explore the world of malware and analyse how malware can infect systems and cause damage.
Malware analysis is like a cat-and-mouse game. Malware authors keep devising new techniques to evade the pruning eye of a malware analyst, while malware analysts keep finding ways to identify and neutralize these techniques. In this module, we will embark on a journey to learn malware analysis from the basics to understanding the common techniques malware authors use. Finally, we will learn about the tools that enable a malware analyst to gain a foothold in identifying what the malware authors are up to and defeat them.

0%
x86 Architecture Overview
A crash course in x86 architecture to enable us in malware reverse engineering.
0%
x86 Assembly Crash Course
A crash course in x86 assembly to enable us in malware reverse engineering.
0%
Windows Internals
Learn and understand the fundamentals of how Windows operates at its core.
0%
Dissecting PE Headers
Learn about Portable Executable files and how their headers work.
0%
Basic Static Analysis
Learn basic malware analysis techniques without running the malware.
0%
MalBuster
You are tasked to analyse unknown malware samples detected by your SOC team.
0%
Advanced Static Analysis
Learn how to identify code constructs and examine the assembly code of malware.
0%
Basic Dynamic Analysis
Learn how to analyze malware Dynamically by running them in a Virtual Machine.
0%
Dynamic Analysis: Debugging
Learn more advanced techniques of dynamic malware analysis.
0%
Anti-Reverse Engineering
Learn the techniques used by malware authors to bypass detection.
0%
MalDoc: Static Analysis
Perform detailed Static Analysis on malicious documents.
What are modules?
A learning pathway is made up of modules, and a module is made of bite-sized rooms (think of a room like a mini security lab).
