YoVDO

Malware Analysis

Offered By: YouTube

Tags

Malware Analysis Courses Cybersecurity Courses Reverse Engineering Courses Ransomware Courses Static Analysis Courses

Course Description

Overview

Dive into the world of malware analysis through a comprehensive 8-hour course covering a wide range of real-world threats. Explore Olympic Destroyer wiper malware, analyze obfuscated VBA in Trickbot downloaders, and dissect Emotet malware using CMD Watcher and CyberChef. Revisit WannaCry ransomware with behavioral and static analysis techniques, and delve into Excel 4.0 macros for Cobalt Strike shellcode injection. Investigate COVID-19-related malware, crack BAT files, and analyze Hangul documents. Learn reverse engineering techniques for SUNBURST SolarWinds malware, SUPERNOVA WebShell, and Java-based threats. Uncover the methods behind the Bangladesh Bank heist, examine Clubhouse malware and JavaScript threats, and gain insights into the Kaseya ransomware attack. Study the NSO Pegasus malware used for government surveillance and explore tools for attributing malware campaigns to nation-states.

Syllabus

Olympic Destroyer - Quick behavioural Analysis of this Wiper Malware.
Analysing Obfuscated VBA - Extracting indicators from a Trickbot downloader.
Analysing an Emotet Downloader with CMD Watcher and CyberChef.
WannaCry Ransomware - Revisited. Behavioural and Static Analysis Techniques.
Live Stream - Part 2 - Emotet Downloader Analysis.
Live Stream - Finding Emotet's Config.
Excel 4.0 Macros Analysis - Cobalt Strike Shellcode Injection.
COVID19 Malware - Getting Closer to the Bad Guys.
Crack The BAT - Identifying Compression, Packers & Googling for IOCs.
Wrangle with Hangul - Analysis of a malicious hwp document.
SUNBURST SolarWinds Malware - Tools, Tactics and Methods to get you started with Reverse Engineering.
SUNBURST SolarWinds RECON - Malware Reverse Engineering, OSINT and Identifying Victims.
SUPERNOVA - Everything you need to know to Reverse Engineer an APT WebShell.
JNLP Dangers - Java Malware Detection & Analysis.
Remcos Config - Using RC4 to Get Command & Control from CyberChef.
How to STEAL $1bn - A look at the Bangladesh Bank Heist.
Clubhouse Malware - Analysis of an Agent Tesla Infection Campaign.
JavaScript Malware - How bad can it be?.
Kaseya Ransomware Attack - 5 Key Insights into this Malware campaign.
NSO Pegasus Malware - How Governments spy on any phone.
Was it Really North Korea? Tools and Techniques to Attribute Malware Campaigns to Nation States.


Taught by

Colin Hardy

Related Courses

FinTech for Finance and Business Leaders
ACCA via edX
Access Controls
(ISC)² via Coursera
Advanced Cyber Security Training
EC-Council via FutureLearn
Python для кибербезопасности. Финальный проект
E-Learning Development Fund via Coursera
Advanced System Security Design
University of Colorado System via Coursera