Completed
Crack The BAT - Identifying Compression, Packers & Googling for IOCs
Class Central Classrooms beta
YouTube videos curated by Class Central.
Classroom Contents
Malware Analysis
Automatically move to the next video in the Classroom when playback concludes
- 1 Olympic Destroyer - Quick behavioural Analysis of this Wiper Malware
- 2 Analysing Obfuscated VBA - Extracting indicators from a Trickbot downloader
- 3 Analysing an Emotet Downloader with CMD Watcher and CyberChef
- 4 WannaCry Ransomware - Revisited. Behavioural and Static Analysis Techniques
- 5 Live Stream - Part 2 - Emotet Downloader Analysis
- 6 Live Stream - Finding Emotet's Config
- 7 Excel 4.0 Macros Analysis - Cobalt Strike Shellcode Injection
- 8 COVID19 Malware - Getting Closer to the Bad Guys
- 9 Crack The BAT - Identifying Compression, Packers & Googling for IOCs
- 10 Wrangle with Hangul - Analysis of a malicious hwp document
- 11 SUNBURST SolarWinds Malware - Tools, Tactics and Methods to get you started with Reverse Engineering
- 12 SUNBURST SolarWinds RECON - Malware Reverse Engineering, OSINT and Identifying Victims
- 13 SUPERNOVA - Everything you need to know to Reverse Engineer an APT WebShell
- 14 JNLP Dangers - Java Malware Detection & Analysis
- 15 Remcos Config - Using RC4 to Get Command & Control from CyberChef
- 16 How to STEAL $1bn - A look at the Bangladesh Bank Heist
- 17 Clubhouse Malware - Analysis of an Agent Tesla Infection Campaign
- 18 JavaScript Malware - How bad can it be?
- 19 Kaseya Ransomware Attack - 5 Key Insights into this Malware campaign
- 20 NSO Pegasus Malware - How Governments spy on any phone
- 21 Was it Really North Korea? Tools and Techniques to Attribute Malware Campaigns to Nation States