: Utilizing memory dump analysis to detect obfuscated malware that may not leave traces on the physical disk.
: Detailed observations of how the samples interact with a system, including attempts to override DNS settings, system shutdowns, and clipboard copying. ColonelYobo_2022_Nov-Dec.zip
: Executing the malware in a controlled sandbox (like Cuckoo or Any.Run) to monitor real-time file system changes, network traffic, and API calls. : Utilizing memory dump analysis to detect obfuscated
: Applying algorithms such as Random Forest or Gradient Boosting to classify malware types based on extracted features like file size or network connections. including attempts to override DNS settings
: Analysis of "hooks" in registry keys or values designed to protect autostart capabilities for the malware.
![]()
Welcome to SIGLENT North America.
Please select a website to continue