← Back to Skills Library

Malware Analysis

Information Technology > Transaction security and virus protection

Description

Malware analysis is a specialized skill in the cybersecurity field that involves examining malicious software to understand its purpose, functionality, and impact. This process often includes static and dynamic analysis techniques, reverse engineering, and the use of various tools to dissect the malware. Analysts look at how the malware behaves, interacts with networks, and modifies system files. They also study the encryption and obfuscation methods used by the malware to evade detection. Advanced practitioners can even develop custom tools for analysis, perform memory forensics, and understand complex threats like advanced persistent threats (APTs). The ultimate goal is to mitigate the threat and prevent future attacks.

Expected Behaviors

LEVEL 1

Fundamental Awareness

At the fundamental awareness level, an individual is expected to have a basic understanding of computer networks, operating systems, and programming languages. They should also be aware of different types of malware and their basic characteristics, as well as understand basic cybersecurity concepts.

🌱
LEVEL 2

Novice

A novice is expected to be able to use basic malware analysis tools and understand file system structures. They should have a basic knowledge of malware behavior and be able to perform static and dynamic analysis. Understanding of basic reverse engineering techniques is also expected at this level.

🌍
LEVEL 3

Intermediate

An intermediate-level analyst is expected to be proficient in using advanced malware analysis tools and understand advanced malware behavior. They should be able to perform advanced static and dynamic analysis, understand encryption and obfuscation techniques used by malware, and have knowledge of advanced reverse engineering techniques.

LEVEL 4

Advanced

At the advanced level, an individual is expected to be able to analyze complex malware samples and understand advanced network traffic analysis. They should be proficient in scripting for automation of analysis tasks, perform memory forensics, and understand rootkit detection techniques.

🏆
LEVEL 5

Expert

An expert is expected to be able to develop custom tools for malware analysis and understand advanced persistent threats (APTs). They should be proficient in kernel-level malware analysis, perform advanced code deobfuscation, and understand exploit development and mitigation techniques.

Micro Skills

LEVEL 1

Fundamental Awareness

Understanding of TCP/IP
Familiarity with HTTP/HTTPS
Understanding of DNS
Awareness of FTP/SFTP
Knowledge of NTFS
Understanding of FAT32
Familiarity with ext4
Awareness of HFS+
Knowledge of replication methods
Understanding of payload delivery
Familiarity with evasion techniques
Awareness of detection methods
Understanding of confidentiality
Understanding of integrity
Familiarity with availability
Awareness of non-repudiation
🌱
LEVEL 2

Novice

Familiarity with common malware analysis tools like IDA Pro, OllyDbg
Understanding of how to set up a safe environment for malware analysis
Knowledge of how to use virtual machines for malware analysis
Knowledge of different file systems like NTFS, FAT32, ext4
Understanding of how files are stored and retrieved
Awareness of how malware can hide or disguise itself in a file system
Understanding of how malware infects a system
Knowledge of common actions performed by malware like data theft, system modification
Awareness of how malware communicates with its command and control servers
Understanding of how to analyze a malware sample without executing it (static analysis)
Knowledge of how to analyze a malware sample by executing it in a controlled environment (dynamic analysis)
Ability to interpret the results of static and dynamic analysis
Knowledge of how to disassemble a binary
Understanding of how to read assembly language
Awareness of how to use debuggers to step through code
🌍
LEVEL 3

Intermediate

Understanding of disassembler usage
Understanding of debugger usage
Knowledge of automated malware analysis systems
Understanding of manual sandboxing techniques
Understanding of packet capture tools
Understanding of network intrusion detection systems
Understanding of memory acquisition tools
Understanding of memory analysis tools
LEVEL 4

Advanced

Understanding of various malware families and their characteristics
Proficiency in using disassemblers and debuggers
Ability to identify and analyze malicious payloads
Understanding of advanced evasion techniques used by malware
Ability to identify malicious network activities
Understanding of different network protocols and their vulnerabilities
Ability to perform deep packet inspection
Ability to automate repetitive tasks in malware analysis
Understanding of operating system memory management
Proficiency in using memory forensics tools
Ability to identify malicious processes in memory
Understanding of techniques used by malware to hide in memory
Knowledge of different types of rootkits and their behavior
Understanding of kernel-level operations
Ability to identify signs of rootkit infection
🏆
LEVEL 5

Expert

Proficiency in multiple programming languages
Understanding of malware behavior and characteristics
Knowledge of existing malware analysis tools and their limitations
Ability to design and implement new features for malware analysis
Knowledge of common APT tactics, techniques, and procedures
Ability to analyze complex network traffic associated with APTs
Understanding of the lifecycle of APT attacks
Ability to identify indicators of compromise related to APTs
Understanding of operating system kernel architecture
Ability to analyze kernel-level rootkits
Knowledge of kernel debugging techniques
Understanding of driver-level malware
Understanding of common obfuscation techniques used by malware
Ability to use reverse engineering tools to deobfuscate code
Knowledge of scripting languages for automation of deobfuscation tasks
Ability to identify and analyze packed malware
Knowledge of common software vulnerabilities
Ability to develop proof-of-concept exploits
Understanding of exploit mitigation techniques
Ability to analyze exploits used by malware

Skill Overview

  • Expert5 years experience
  • Micro-skills74
  • Roles requiring skill3

Sign up to prepare yourself or your team for a role that requires Malware Analysis.

LoginSign Up