What this book covers
Chapter 1, Creating and Maintaining Your Detonation Environment, provides a guide to building your malware analysis lab.
Chapter 2, Static Analysis – Techniques and Tooling, provides an introduction to basic analysis without execution.
Chapter 3, Dynamic Analysis – Techniques and Tooling, provides an introduction to basic behavioral analysis.
Chapter 4, A Word on Automated Sandboxing, covers how to automate basic analysis of malware.
Chapter 5, Advanced Static Analysis – Out of the White Noise, dives into more advanced static analysis utilizing Ghidra and other tooling.
Chapter 6, Advanced Dynamic Analysis – Looking at Explosions, provides a closer look at advanced behavioral analysis techniques.
Chapter 7, Advanced Dynamic Analysis Part 2 – Refusing to Take the Blue Pill, provides a look at how malware may attempt to misdirect analysis efforts.
Chapter 8, De-Obfuscation – Putting the Toothpaste Back in the Tube, covers analysis, de-obfuscation, and the triage of malicious droppers and scripts.
Chapter 9, The Reverse Card – Weaponization of IOCs and OSINT for Defense, covers how intelligence gained during analysis may be leveraged to defend the network.
Chapter 10, Malicious Functionality – Mapping Your Sample's Behavior against MITRE ATT&CK, covers leveraging the ATT&CK framework to communicate malicious capability and write concise, efficacious reports.
Chapter 11, Challenge Solutions, covers the challenges that have been posed throughout the book in several of the chapters.