In this video walkthrough, we covered a cyber incident response case study that involved a malicious PDF malware delivered through a phishing email. The PDF malware once opened, spawned a powershell session in a hidden window that execute a base64 encoded command to retrieve another malicious file from a C2 server. We extracted the sample using Volatility plugins then we uploaded the sample to Virustotal and Any.run to dynamically analyze the malware and extract the related artifacts.
****
Receive Cyber Security Field, Certifications Notes and Special Training Videos
/ @motasemhamdan
*****
Register and start analyzing malwares with Any.run
https://app.any.run/?utm_source=youtu...
******
Writeup
https://motasem-notes.net/en/memory-f...
********
Google Profile
https://maps.app.goo.gl/eLotQQb7Dm6ai...
LinkedIn
[1]: / motasem-hamdan-7673289b
[2]: / motasem-eldad-ha-bb42481b2
Instagram
/ dev.stuxnet
Twitter
/ manmotasem
Facebook
/ motasemhamdantty