Completed
Trojan.Bisonal resulting AIOC description
Class Central Classrooms beta
YouTube videos curated by Class Central.
Classroom Contents
Practical Incident Response in Heterogenous Environment
Automatically move to the next video in the Classroom when playback concludes
- 1 Intro
- 2 The mass-triage problem in 2018
- 3 Traditional IOCs application
- 4 RIFT (Retrieve Interesting Files Tool)
- 5 FRAC (Forensic Response Acquisition): The Output
- 6 Malware analysis process to build AIOCs
- 7 Example: Poisonivy
- 8 AIOCs formalization process
- 9 Trojan.Bisonal resulting AIOC description
- 10 Trojan.Bisonal traffic
- 11 Bisonal Behavior
- 12 YARA RULES toward AIOCs
- 13 Clam AV: Intro
- 14 YARA Rules, AICs and ClamAV
- 15 Using ClamAV to Scan for Badness
- 16 Using ClamAV: Results Custom Rules - ClamAV
- 17 Using ClamAV: Results Custom Rules - Yara
- 18 Sigtool: ClamAV command line
- 19 Sigtool: Command explained
- 20 Generating ClamAV Signatures with IDA with CASC
- 21 Remote ClamAV scan with Psexec
- 22 Remote ClamAV scan with FRAC
- 23 ClamAV Bisonal - logic signature
- 24 ClamAV and Forensics
- 25 Where are we heading