Advanced automation of static malware analysis. Hands-on workshop

If you are an experienced security researcher or incident responder and deal with malware analysis in a professional capacity and at a scale, you understand how important it is to automate static analysis in order to optimize routine tasks and preserve your work in code for your team. Join Igor Kuznetsov, Chief Security Researcher, Kaspersky GReAT, in this practical webinar, where he unveils his automation know-hows distilled from years of APT research experience. He will also introduce his new online course on Advanced Malware Analysis Techniques. Read more about the course here: https://kas.pr/gr9i

In this webinar, Igor will inspect samples from the notorious Bangladesh (Central) Bank heist and use them to walk through the common tasks required for malware analysis: recognizing crypto algorithms and writing decoding tools.

  1. Firstly, Igor will analyze the code and data flow using IDA Pro to locate the code used to decrypt the configuration file (“gpca.dat”).
  2. Then, he will inspect the code to recognize the common cipher used by the malicious sample. Using that information and Python 3, Igor will create a static decoder to decrypt the file.
  3. Finally, the session will discuss ways to improve tooling by creating static analysis frameworks, which are used in the recently launched Kaspersky Advanced Malware Analysis Training.

Igor will also introduce the new Advanced Malware Analysis Techniques online course. This self-study, 100% hands-on advanced course is based on 16 real-life, notorious cases including Lazarus, Carbanak, MikiDuke etc. which Igor has personally worked on. The course focuses on static analysis techniques and also features automation of decryption, decoding, and other sample processing techniques. Webinar participants will have the opportunity to win free access to this new online course.