Demonstrate the practical use of the malware analysis techniques
- Country :
Australia
Assignment 2: Applied Reverse Engineering Analysis
Precautions
There is always risk associated with handling malware, the following precautions must be taken when doing so.
- Malware must be downloaded directly into the virtual machine.
- Malware must not be executed at any time unless within a contained debug environment.
- Malware must not be marked executable or renamed to an executable extension at any time.
- When transporting malware, it should always be contained within a password protected and encrypted zip file. The password is “infected”.
- Do not allow others to access malware samples provided to you.
Disclaimer
By accessing the provided malware samples, you acknowledge the following:
- Edith Cowan University cannot be held liable for any adverse effects to any computer systems or for any loss or damage suffered as a result of malware samples or any other materials provided.
- The malware samples provided are live and unmodified, inappropriate handling could lead to infection of computer systems or other electronic devices.
- You accept all responsibility for any adverse effects to any computer systems or for any loss or damage suffered.
- Alternative assessment options are provided on request.
Malware Samples
If you are having issues with the assigned samples, please contact your lecturer or tutor immediately. Malware samples are available in Blackboard.
Assignment Brief
This assignment requires that you demonstrate the practical use of the malware analysis techniques covered in this unit. Once you unzip the malware sample zip file, you will get five malware samples. Of the five, you must select two to be used in your assessment. You are encouraged to conduct a brief preliminary analysis of all allocated samples to inform your selection of samples. For each of the two selected malware samples, you must conduct an in-depth reverse engineering effort to write an analysis report and prepare a presentation.