: Detailed observations of how the samples interact with a system, including attempts to override DNS settings, system shutdowns, and clipboard copying.
: Utilizing memory dump analysis to detect obfuscated malware that may not leave traces on the physical disk. ColonelYobo_2022_Nov-Dec.zip
The zip file is a collection of malware analysis reports and artifacts associated with the Fall 2022 Introduction to Information Security (CS 6035) curriculum at Georgia Tech. Overview of Content : Detailed observations of how the samples interact
Write-ups of this nature generally employ several standard cybersecurity methodologies to extract information from the samples: including attempts to override DNS settings