Readers of this book are required to take precautions when handling malware files. Here are some initial tips that can help us to prevent our host machine from being compromised:
- Do your analysis in an enclosed environment such as a separate computer or in a virtual machine.
- If network access is not required, cut it off.
- If internet access is not required, cut it off.
- When copying files manually, rename the file to a filename that doesn't execute. For example, rename myfile.exe to myfile.foranalysis.