Cuckoo Malware Analysis

Analyze malware using Cuckoo Sandbox
Preview in Mapt

Cuckoo Malware Analysis

Digit Oktavianto, Iqbal Muhardianto

Analyze malware using Cuckoo Sandbox

Quick links: > What will you learn?> Table of content

Mapt Subscription
FREE
$29.99/m after trial
eBook
$16.10
RRP $22.99
Save 29%
Print + eBook
$37.99
RRP $37.99
What do I get with a Mapt Pro subscription?
  • Unlimited access to all Packt’s 5,000+ eBooks and Videos
  • Early Access content, Progress Tracking, and Assessments
  • 1 Free eBook or Video to download and keep every month after trial
What do I get with an eBook?
  • Download this book in EPUB, PDF, MOBI formats
  • DRM FREE - read and interact with your content when you want, where you want, and how you want
  • Access this title in the Mapt reader
What do I get with Print & eBook?
  • Get a paperback copy of the book delivered to you
  • Download this book in EPUB, PDF, MOBI formats
  • DRM FREE - read and interact with your content when you want, where you want, and how you want
  • Access this title in the Mapt reader
What do I get with a Video?
  • Download this Video course in MP4 format
  • DRM FREE - read and interact with your content when you want, where you want, and how you want
  • Access this title in the Mapt reader
$0.00
$16.10
$37.99
$29.99 p/m after trial
RRP $22.99
RRP $37.99
Subscription
eBook
Print + eBook
Start 14 Day Trial

Frequently bought together


Cuckoo Malware Analysis Book Cover
Cuckoo Malware Analysis
$ 22.99
$ 16.10
Windows Malware Analysis Essentials Book Cover
Windows Malware Analysis Essentials
$ 39.99
$ 28.00
Buy 2 for $33.60
Save $29.38
Add to Cart

Book Details

ISBN 139781782169239
Paperback142 pages

Book Description

Cuckoo Sandbox is a leading open source automated malware analysis system. This means that you can throw any suspicious file at it and, in a matter of seconds, Cuckoo will provide you with some detailed results outlining what said file did when executed inside an isolated environment.

Cuckoo Malware Analysis is a hands-on guide that will provide you with everything you need to know to use Cuckoo Sandbox with added tools like Volatility, Yara, Cuckooforcanari, Cuckoomx, Radare, and Bokken, which will help you to learn malware analysis in an easier and more efficient way.

Cuckoo Malware Analysis will cover basic theories in sandboxing, automating malware analysis, and how to prepare a safe environment lab for malware analysis. You will get acquainted with Cuckoo Sandbox architecture and learn how to install Cuckoo Sandbox, troubleshoot the problems after installation, submit malware samples, and also analyze PDF files, URLs, and binary files. This book also covers memory forensics – using the memory dump feature, additional memory forensics using Volatility, viewing result analyses using the Cuckoo analysis package, and analyzing APT attacks using Cuckoo Sandbox, Volatility, and Yara.

Finally, you will also learn how to screen Cuckoo Sandbox against VM detection and how to automate the scanning of e-mail attachments with Cuckoo.

Table of Contents

Chapter 1: Getting Started with Automated Malware Analysis using Cuckoo Sandbox
Malware analysis methodologies
Basic theory in Sandboxing
Malware analysis lab
Cuckoo Sandbox
Installing Cuckoo Sandbox
Summary
Chapter 2: Using Cuckoo Sandbox to Analyze a Sample Malware
Starting Cuckoo
Submitting malware samples to Cuckoo Sandbox
Submitting a malware Word document
Submitting a malware PDF document – aleppo_plan_cercs.pdf
Submitting a malware Excel document – CVE-2011-0609_XLS-SWF-2011-03-08_crsenvironscan.xls
Submitting a malicious URL – http://youtibe.com
Submitting a malicious URL – http://ziti.cndesign.com/biaozi/fdc/page_07.htm
Submitting a binary file – Sality.G.exe
Memory forensic using Cuckoo Sandbox – using memory dump features
Additional memory forensic using Volatility
Summary
Chapter 3: Analyzing the Output of Cuckoo Sandbox
The processing module
Analyzing an APT attack using Cuckoo Sandbox, Volatility, and Yara
Summary
Chapter 4: Reporting with Cuckoo Sandbox
Creating a built-in report in HTML format
Creating a MAEC Report
Exporting data report analysis from Cuckoo to another format
Summary
Chapter 5: Tips and Tricks for Cuckoo Sandbox
Hardening Cuckoo Sandbox against VM detection
Cuckooforcanari – integrating Cuckoo Sandbox with the Maltego project
Automating e-mail attachments with Cuckoo MX
Summary

What You Will Learn

  • Get started with automated malware analysis using Cuckoo Sandbox
  • Use Cuckoo Sandbox to analyze sample malware
  • Analyze output from Cuckoo Sandbox
  • Report results with Cuckoo Sandbox in standard form
  • Learn tips and tricks to get the most out of your malware analysis results

Authors

Table of Contents

Chapter 1: Getting Started with Automated Malware Analysis using Cuckoo Sandbox
Malware analysis methodologies
Basic theory in Sandboxing
Malware analysis lab
Cuckoo Sandbox
Installing Cuckoo Sandbox
Summary
Chapter 2: Using Cuckoo Sandbox to Analyze a Sample Malware
Starting Cuckoo
Submitting malware samples to Cuckoo Sandbox
Submitting a malware Word document
Submitting a malware PDF document – aleppo_plan_cercs.pdf
Submitting a malware Excel document – CVE-2011-0609_XLS-SWF-2011-03-08_crsenvironscan.xls
Submitting a malicious URL – http://youtibe.com
Submitting a malicious URL – http://ziti.cndesign.com/biaozi/fdc/page_07.htm
Submitting a binary file – Sality.G.exe
Memory forensic using Cuckoo Sandbox – using memory dump features
Additional memory forensic using Volatility
Summary
Chapter 3: Analyzing the Output of Cuckoo Sandbox
The processing module
Analyzing an APT attack using Cuckoo Sandbox, Volatility, and Yara
Summary
Chapter 4: Reporting with Cuckoo Sandbox
Creating a built-in report in HTML format
Creating a MAEC Report
Exporting data report analysis from Cuckoo to another format
Summary
Chapter 5: Tips and Tricks for Cuckoo Sandbox
Hardening Cuckoo Sandbox against VM detection
Cuckooforcanari – integrating Cuckoo Sandbox with the Maltego project
Automating e-mail attachments with Cuckoo MX
Summary

Book Details

ISBN 139781782169239
Paperback142 pages
Read More

Read More Reviews

Recommended for You

Windows Malware Analysis Essentials Book Cover
Windows Malware Analysis Essentials
$ 39.99
$ 28.00
Computer Forensics with FTK Book Cover
Computer Forensics with FTK
$ 13.99
$ 9.80
Practical Windows Forensics Book Cover
Practical Windows Forensics
$ 39.99
$ 28.00
Learning Network Forensics Book Cover
Learning Network Forensics
$ 39.99
$ 28.00
Kali Linux 2 - Assuring Security by Penetration Testing - Third Edition Book Cover
Kali Linux 2 - Assuring Security by Penetration Testing - Third Edition
$ 35.99
$ 25.20
Kali Linux Network Scanning Cookbook Book Cover
Kali Linux Network Scanning Cookbook
$ 30.99
$ 21.70