- Linux toolkit for malware analysis
- static triage of suspicious files
- Office / PDF / script analysis
- IOC extraction
- controlled network observation
- quick analyst workstation with many tools already assembled
Best with:
- isolated lab
- Windows VM for detonation
- Burp / Wireshark / INetSim around it
Always do first
sha256sum sample
file sample
trid sample
exiftool sample
strings -a -n 6 sample | lessstrings -el sample | lessbinwalk sample
ent sample
Goal:
- identify exact format
- find URLs / PowerShell / suspicious APIs
- detect embedded data / packing
INetSim# fake HTTP / DNS / FTP / SMTP and morednschef# fake DNS answers / redirect domains to local IP
Use when:
- sample calls home
- you need to keep egress local
- you want repeatable malware behavior
- you want to catch second-stage downloads
Practical lab notes
- disable direct Internet if possible
- snapshot before detonation
- separate analyst VM and victim VM
- log all callbacks and DNS
- keep hashes and extracted artifacts organized
- save string dumps, YARA hits, and capa output
04Practical Recipes
PE / EXE triage
file sample.exe
strings -a -el sample.exe | tee strings.txt
floss sample.exe | tee floss.txt
capa sample.exe | tee capa.txt
peframe sample.exe | tee peframe.txt
yara rules.yar sample.exe
Document triage
oleid sample.doc
olevba --decode sample.doc
oledump.py sample.doc
msodde sample.doc
mraptor sample.doc
Then extract suspicious macro / blob and rerun main workflow on it.