Completed
Olympic Destroyer - Quick behavioural Analysis of this Wiper Malware
Class Central Classrooms beta
YouTube videos curated by Class Central.
Classroom Contents
Malware Analysis
Automatically move to the next video in the Classroom when playback concludes
- 1 Olympic Destroyer - Quick behavioural Analysis of this Wiper Malware
- 2 Analysing Obfuscated VBA - Extracting indicators from a Trickbot downloader
- 3 Analysing an Emotet Downloader with CMD Watcher and CyberChef
- 4 WannaCry Ransomware - Revisited. Behavioural and Static Analysis Techniques
- 5 Live Stream - Part 2 - Emotet Downloader Analysis
- 6 Live Stream - Finding Emotet's Config
- 7 Excel 4.0 Macros Analysis - Cobalt Strike Shellcode Injection
- 8 COVID19 Malware - Getting Closer to the Bad Guys
- 9 Crack The BAT - Identifying Compression, Packers & Googling for IOCs
- 10 Wrangle with Hangul - Analysis of a malicious hwp document
- 11 SUNBURST SolarWinds Malware - Tools, Tactics and Methods to get you started with Reverse Engineering
- 12 SUNBURST SolarWinds RECON - Malware Reverse Engineering, OSINT and Identifying Victims
- 13 SUPERNOVA - Everything you need to know to Reverse Engineer an APT WebShell
- 14 JNLP Dangers - Java Malware Detection & Analysis
- 15 Remcos Config - Using RC4 to Get Command & Control from CyberChef
- 16 How to STEAL $1bn - A look at the Bangladesh Bank Heist
- 17 Clubhouse Malware - Analysis of an Agent Tesla Infection Campaign
- 18 JavaScript Malware - How bad can it be?
- 19 Kaseya Ransomware Attack - 5 Key Insights into this Malware campaign
- 20 NSO Pegasus Malware - How Governments spy on any phone
- 21 Was it Really North Korea? Tools and Techniques to Attribute Malware Campaigns to Nation States