← Back to Courses

Practical Malware Analysis & R.E.

Dissecting malicious software. Assembly code, debuggers, and reverse engineering.

Curriculum

20 Modules
1

Safety First: The Lab

Setting up a safe, isolated environment for detonating malware.

2

Basic Static Analysis

Using Strings, PEStudio, and VirusTotal to triage samples.

3

Virtual Machines & Sandboxes

Configuring FLARE VM, REMnux, and Cuckoo Sandbox.

4

Basic Dynamic Analysis

Detonating malware while watching Process Monitor and Wireshark.

5

x86 Architecture & Assembly

Understanding Registers (EAX, EBX), The Stack, and Opcodes.

6

Advanced Static Analysis (Disassembly)

Reading logic flow in IDA Pro and Ghidra.

7

Advanced Dynamic Analysis (Debugging)

Stepping through code with x64dbg. Breakpoints and patching.

8

Analyzing Downloaders & Droppers

How malware installs itself and fetches the second stage payload.

9

Malware Persistence

Analyzing Registry Run Keys, Services, and Scheduled Tasks.

10

Code Injection & Hooking

Process Hollowing, DLL Injection, and API Hooking techniques.

11

Obfuscation & Packing

Identifying packed executables (UPX) and unpacking them manually.

12

Analyzing Ransomware

Understanding encryption routines and shadow copy deletion.

13

Analyzing Keyloggers & Spyware

Finding the hook procedure and where stolen data is sent.

14

Network Signatures

Extracting C2 domains and User-Agents for detection rules.

15

Anti-Reverse Engineering

Defeating IsDebuggerPresent() and VM detection checks.

16

Mobile Malware (Android APKs)

Decompiling Java/Smali code with JADX.

17

Rootkits

User-mode vs Kernel-mode rootkits. Hooking the SSDT.

18

BIOS/UEFI Malware

Persistence that survives a hard drive format.

19

Document Malware (VBA Macros)

Analyzing malicious Word/Excel docs (olevba).

20

Capstone: Reverse Engineering a RAT

Full analysis of a Remote Access Trojan sample.

Course Info

~600 Minutes
20 Modules
Start Learning