Challenges
The malware samples for these challenges can be found at https://github.com/PacktPublishing/Malware-Analysis-Techniques.
Challenge 1
Attempt to answer the following questions utilizing what you've learned in this chapter—remembering that you are working with live malware. Do not execute the sample!
- What is the SHA256 hash of the sample?
- What is the
ssdeep
hash of the sample? - Can you attribute this sample to a particular malware family?
Challenge 2
In 2017, malware researcher Marcus Hutchins (@MalwareTechBlog
) utilized the Strings utility to stop the global threat of WannaCry by identifying and sinkholing a kill-switch domain.
Utilizing the second sample, can you correctly identify the kill-switch domain?