Posted May 22, 200916 yr Link:http://www.kishorethakur.com/2008/12/advan...-forensics.htmlHere are a few quick steps for performing malware analysis on various badware (viruses, works, trojans, rootkits) that you may find in the course of a computer forensics investigation. In this case, I'm analyzing a variant of Sohanad, a Instant Messaging Worm, also known as "the cool pics worm".
May 23, 200916 yr Nice read man I like the list of tools at the start and the explanation of what they all do.
Create an account or sign in to comment