Posts

Showing posts from June, 2023

My Kind of Malware Analysis Lab Set-up

Image
In this write-up I'll go over with my Malware Analysis Lab set-up to kind of run through the basics of safety Malware handling when analysing real world Malware. The aim of this write-up is to document my journey in Malware Analysis to practice safety Malware handling ALWAYS! In the above diagram, you'll find my current Malware Analysis Lab environment wherein we will use it to detonate and dissect Malwares for analysis. We will use FlareVM a Windows based Malware Analysis Distribution and REMnux OS to isolate our Host machine and run these OS thru virtual machine. The virtual environment is isolated and not in anyway connected to our host machine and wild Internet. This is purposely done to get rid of the risk associated with the tasks while we examine and detonate Malwares which is very HARMFUL and RISKY by its nature. So our goal is to practice SAFETY ALWAYS when handling Malware! Goal: Malware analysis provides a very accurate and comprehensive list of IoCs compared to othe...

CanaryTokens

Image
  Creating Callbacks Using CanaryTokens .org First, navigate to  http://canarytokens.org  with Firefox Select "Microsoft Word Document" from the drop-down menu. Add a real email address in the email field. This email address is used to receive notifications when the token is triggered. Enter a message in the final box. Click "Create my Canarytoken" when finished. This will give you the option to download the document: Click on the download button to download the document. Next, email this document to a system running Microsoft Word: When you receive the email, open it in Word. The document will be blank when you first open it, but the file can be renamed or modified if desired. Once the document is open, go back to "canarytokens.org" and manage the token. This will bring up the page that shows the document was opened, the IP, and the location of the IP address where the document was opened.