Friday 28 November 2014

Best tools for Malware Analysis

Best tools for Malware Analysis

Malware is coined from the two words malicious and software. Malware refers to Spyware, Trojans, Bots, Viruses, Hijackers and auxiliary pieces of software considering malicious intent.A list of malware analysis tools intended to log the behavior of a process, log its network traffic, access to the registry etc. Mobile malware analysis tools are included together behind than useful sandboxing software for nimble analysis.
VirusTotal is a forgive advance that analyzes suspicious files and URLs and facilitates the fast detection of viruses, worms, trojans, and all kinds of malware.
SysAnalyzer is an automated malcode warn era analysis application that monitors various aspects of system and process states. SysAnalyzer was expected to enable analysts to rapidly construct a sum relation as to the activities a binary takes on a system. SysAnalyzer can automatically monitor and compare:
* Running Processes
* Open Ports
* Loaded Drivers
* Injected Libraries
* Key Registry Changes
* APIs called by a twist process
* File Modifications
* HTTP, IRC, and DNS traffic
www.robtex.com
In the https://www.robtex.com/ you can search for:
DNS checks detailed dns hint for a hostname
IP-number checks ip number hint such as dns reverse and forwards
route checks a specific routed prefix
AS numbers checks warn very roughly an AS-number
AS macros checks who belongs to an AS-macro
MalZilla
Web pages that contain exploits often use a series of redirects and obfuscated code to make it more hard for somebody to follow. MalZilla is a useful program for use in exploring malicious pages. It allows you to pick your own fan agent and referrer, and has the fighting to use proxies. It shows you the full source of webpages and all the HTTP headers. It gives you various decoders to attempt and deobfuscate javascript aswell.
Regshot is a little, discharge and ensnare-source registry compare serve that allows you to hurriedly believe a snapshot of your registry and also compare it once a second one - finished after disturbance an combat-stroke system changes or installing a additional software product. The changes savings account can be produced in text or HTML format and contains a list of all modifications that have taken place surrounded by the two snapshots. In tallying, you can along with specify folders (gone subfolders) to be scanned for changes as adroitly.
Wireshark the best network traffic analyzer in my insinuation. Malicious programs on the subject of always cause some sort of network traffic and you nonappearance to be adept to decode what this traffic is. It might be a password live thing sent to an IRC server to colleague a channel, it might even be that text file you stored upon your desktop as passwords.txt. Have your network analyzer setup to the lead you manage the malicious code that exaggeration you wont miss a single packet.
The Volatility Framework is a deeply twist accretion of tools, implemented in Python under the GNU General Public License (GPL v2), for the lineage of digital artifacts from volatile memory (RAM) samples. The stock techniques are performed terribly independent of the system mammal investigated but designate unprecedented visibility into the runtime make a clean breast of the system

1 comment:

  1. You shared very useful tools for malware analysis. I am really very happy to find such useful blog. Thanks for sharing

    ReplyDelete

Prevention Techniques: Cross-site request forgery (CSRF)

1. The best defense against CSRF attacks is unpredictable tokens, a piece of data that the server can use to validate the request, and wh...