paint-brush
Malware Analysis using Osquery | Part 2by@n0dec
2,203 reads
2,203 reads

Malware Analysis using Osquery | Part 2

by Javier Ruiz6mAugust 16th, 2018
Read on Terminal Reader
Read this story w/o Javascript
tldt arrow

Too Long; Didn't Read

In the <a href="https://www.alienvault.com/blogs/labs-research/malware-analysis-using-osquery-part-1" target="_blank">first part</a> of this series, we saw how you can use Osquery to analyze and extract valuable information about malware’s behavior. In that post, we followed the activity of the known Emotet loader, popular for distributing banking trojans. Using Osquery, we were able to discover how it infects a system using a malicious Microsoft Office document and how it extracts and executes the payload.

Companies Mentioned

Mention Thumbnail
Mention Thumbnail
featured image - Malware Analysis using Osquery | Part 2
Javier Ruiz HackerNoon profile picture
Javier Ruiz

Javier Ruiz

@n0dec

L O A D I N G
. . . comments & more!

About Author

TOPICS

THIS ARTICLE WAS FEATURED IN...

Permanent on Arweave
Read on Terminal Reader
Read this story in a terminal
 Terminal
Read this story w/o Javascript
Read this story w/o Javascript
 Lite