Search icon
Arrow left icon
All Products
Best Sellers
New Releases
Books
Videos
Audiobooks
Learning Hub
Newsletters
Free Learning
Arrow right icon
Cuckoo Malware Analysis

You're reading from  Cuckoo Malware Analysis

Product type Book
Published in Oct 2013
Publisher Packt
ISBN-13 9781782169239
Pages 142 pages
Edition 1st Edition
Languages

Additional memory forensic using Volatility


Now after we dump the memory, we need to do some forensics on it. The tool we will use is called Volatility Framework. It can extract digital artifacts from volatile memory (RAM) dumps. Volatility can analyze RAM dumps from 32-bit and 64-bit Windows, Linux, Mac OS, and Android systems.

  1. Download the latest Volatility available.

  2. After you finish downloading the file, you have to extract the files into a folder:

    $ tar -zxvf volatility-2.2.tar.gz
    

    Note

    Find the latest Volatility download link here: https://code.google.com/p/volatility/wiki/VolatilityIntroduction

  3. Change the directory to volatility-2.2:

    $ cd volatility-2.2/
    $ ls
    

    Our memory analysis will be using the vol.py file.

Using Volatility...

lock icon The rest of the chapter is locked
Register for a free Packt account to unlock a world of extra content!
A free Packt account unlocks extra newsletters, articles, discounted offers, and much more. Start advancing your knowledge today.
Unlock this book and the full library FREE for 7 days
Get unlimited access to 7000+ expert-authored eBooks and videos courses covering every tech area you can think of
Renews at $15.99/month. Cancel anytime}