|
3
|
Lab Triage 1-4
|
154febc33163936960440ccf1481205b6192054e029bc8826966dc658e5c83e8
|
triage
lnk
|
Analyze the samples with trid and determine their file types. Parse LNK files w…
|
|
|
4
|
Lab Wrapped files 1-4
|
2c55d6bae3a834e6741c016ccb80821b54f51b7e39fddb353a81ea66015dc9a0
|
wrapped
|
Determine which wrapper was used. Extract the contained files.
|
|
|
4
|
Lab Installers 1-4
|
dfc49d090793a08bef805099e05833b3cb7c8314e3088718d5b014c891240590
|
installer
|
Identify the installer. Extract the contained files and, if available, the inst…
|
|
|
5
|
ASEPs
|
a3e41ea1d20fa2fcaf266155bf5c8195768f33e4688f0d13d18c58e25c599356
|
disinfection
autoruns
|
Run the application, then figure out the ASEPs and clean the system manually.
|
|
|
6
|
Lab PE 1-4
|
f80e8a6641b4d055cdb0686cb689b152cddb7d5aef28bc12f7ae609fa324c6d3
|
pe metadata
|
Learn how the Portable Executable format looks like by analyzing the file with …
|
|
|
6
|
Portable executable exercise
|
bf942fda5040f494485d4cc2bfc4004ea66b99ac04619664f722b01026906375
|
.net
grayware
pe metadata
|
Use PortexAnalyzerGUI.jar on this sample to extract information about the Porta…
|
|