Identify Unknown Malware Using Four Free Threat Intelligence Services
If you are reverse engineering a new malware sample and can't identify it here are our four favourite free threat intel resources that might help! Expand for more...
-----
OALABS DISCORD
https://discord.gg/6h5Bh5AMDU
OALABS PATREON
https://www.patreon.com/oalabs
Twitch
https://www.twitch.tv/oalabslive
OALABS GITHUB
https://github.com/OALabs
UNPACME - AUTOMATED MALWARE UNPACKING
https://www.unpac.me/#/
-----
VirusTotal
https://www.virustotal.com/
Malware Bazaar
https://bazaar.abuse.ch/
Malpedia
https://malpedia.caad.fkie.fraunhofer.de/
Intezer
https://analyze.intezer.com/
Sample:
https://malshare.com/sample.php?action=detail&hash=22d7d67c3af10b1a37f277ebabe2d1eb4fd25afbd6437d4377400e148bcc08d6
Видео Identify Unknown Malware Using Four Free Threat Intelligence Services канала OALabs
-----
OALABS DISCORD
https://discord.gg/6h5Bh5AMDU
OALABS PATREON
https://www.patreon.com/oalabs
Twitch
https://www.twitch.tv/oalabslive
OALABS GITHUB
https://github.com/OALabs
UNPACME - AUTOMATED MALWARE UNPACKING
https://www.unpac.me/#/
-----
VirusTotal
https://www.virustotal.com/
Malware Bazaar
https://bazaar.abuse.ch/
Malpedia
https://malpedia.caad.fkie.fraunhofer.de/
Intezer
https://analyze.intezer.com/
Sample:
https://malshare.com/sample.php?action=detail&hash=22d7d67c3af10b1a37f277ebabe2d1eb4fd25afbd6437d4377400e148bcc08d6
Видео Identify Unknown Malware Using Four Free Threat Intelligence Services канала OALabs
Показать
Комментарии отсутствуют
Информация о видео
Другие видео канала
![Tips for Analysis of Large Complex Binaries [ Reverse Engineering AMA ]](https://i.ytimg.com/vi/2rhyCGHHiSU/default.jpg)
![Why Is The PE Entry Point Not The Same As Main SEH and The _security_init_cookie [Patreon Unlocked]](https://i.ytimg.com/vi/suwZB3EA_u4/default.jpg)
![One Trick To Level Up Your Reverse Engineering [ Reverse Engineering AMA ]](https://i.ytimg.com/vi/EjVVbM6ub00/default.jpg)
![How To Recognize Macro Encrypted Strings in Malware](https://i.ytimg.com/vi/fEAGYjhKzJY/default.jpg)
![RE Tools Spotlight: Binary Refinery - High Octane Malware Triage Analysis](https://i.ytimg.com/vi/4gTaGfFyMK4/default.jpg)
![How To Identify Unknown Crypto Functions [ Reverse Engineering AMA ]](https://i.ytimg.com/vi/BGIDMpSztSk/default.jpg)
![Fast Malware Unpacking With CryptDecrypt and RtlDecompressBuffer](https://i.ytimg.com/vi/2zYokTkzIC8/default.jpg)
![Do Companies Actually Pay Ransomware [ Reverse Engineering AMA ]](https://i.ytimg.com/vi/-CD82mTcy5A/default.jpg)
![M1 Mac Malware Analysis VM Setup with Windows 11 (Free)](https://i.ytimg.com/vi/0eR8yrDLV5M/default.jpg)
![What The Security Industry Should Know About Reverse Engineering [ Reverse Engineering AMA ]](https://i.ytimg.com/vi/SffxAVWmbk4/default.jpg)
![Unpacking Pykspa Malware With Python and IDA Pro - Subscriber Request Part 1](https://i.ytimg.com/vi/HfSQlC76_s4/default.jpg)
![RedTeam Tricks Exposed - Reversing Engineering Syscalls To Evade Detection](https://i.ytimg.com/vi/Uba3SQH2jNE/default.jpg)
![Farewell 2017 - Reverse Engineering Bloopers and Fails](https://i.ytimg.com/vi/04qiaxDKA-g/default.jpg)
![Unpacking and Extracting TrickBot Malware Configuration With x64dbg and Python](https://i.ytimg.com/vi/EdchPEHnohw/default.jpg)
![Introduction to YARA Part 3 - Rule Use Cases](https://i.ytimg.com/vi/xutDqu_OiH8/default.jpg)
![Introduction to YARA Part 4 - Efficient Rule Development](https://i.ytimg.com/vi/xKeF_cPKXt0/default.jpg)
![Does Big Cyber Pay Better Than Startups [ Reverse Engineering AMA ]](https://i.ytimg.com/vi/9KE3Xu2c6c4/default.jpg)
![IDA Pro Decompiler Basics Microcode and x86 Calling Conventions](https://i.ytimg.com/vi/T0tdj1WDioM/default.jpg)
![Process Memory Basics for Reverse Engineers - Tracking Memory With A Debugger [ Patreon Unlocked ]](https://i.ytimg.com/vi/eWYENJ5kG00/default.jpg)
![Career / Interview Advice for Reverse Engineers [ Twitch Clip ]](https://i.ytimg.com/vi/5PTeYipf8mc/default.jpg)