Overview
Syllabus
Olympic Destroyer - Quick behavioural Analysis of this Wiper Malware.
Analysing Obfuscated VBA - Extracting indicators from a Trickbot downloader.
Analysing an Emotet Downloader with CMD Watcher and CyberChef.
WannaCry Ransomware - Revisited. Behavioural and Static Analysis Techniques.
Live Stream - Part 2 - Emotet Downloader Analysis.
Live Stream - Finding Emotet's Config.
Excel 4.0 Macros Analysis - Cobalt Strike Shellcode Injection.
COVID19 Malware - Getting Closer to the Bad Guys.
Crack The BAT - Identifying Compression, Packers & Googling for IOCs.
Wrangle with Hangul - Analysis of a malicious hwp document.
SUNBURST SolarWinds Malware - Tools, Tactics and Methods to get you started with Reverse Engineering.
SUNBURST SolarWinds RECON - Malware Reverse Engineering, OSINT and Identifying Victims.
SUPERNOVA - Everything you need to know to Reverse Engineer an APT WebShell.
JNLP Dangers - Java Malware Detection & Analysis.
Remcos Config - Using RC4 to Get Command & Control from CyberChef.
How to STEAL $1bn - A look at the Bangladesh Bank Heist.
Clubhouse Malware - Analysis of an Agent Tesla Infection Campaign.
JavaScript Malware - How bad can it be?.
Kaseya Ransomware Attack - 5 Key Insights into this Malware campaign.
NSO Pegasus Malware - How Governments spy on any phone.
Was it Really North Korea? Tools and Techniques to Attribute Malware Campaigns to Nation States.
Taught by
Colin Hardy