
Cuckoo Malware Analysis

Now, you have successfully prepared the Host OS and Guest OS in the VirtualBox and then installed Cuckoo Sandbox. It is important to make sure that all the dependencies that are needed in the Host OS along with pydeep
and yara
are present. For the Guest OS, always turn off the defensive parameter and Windows firewall and use any software that the malware often use to interact with, for example, Adobe Reader 9.5, Internet Explorer 6, Microsoft Office 2003, and so on.
Always set your configuration in <machinemanager>.conf
in exactly the same way as it is in the virtualization software you are using. For example, if you are using KVM, you have to set kvm
in machinemanager.conf
. Since we are using VirtualBox, you have to set virtualbox
in the configuration. You have to be careful at the time of inserting the name of the Guest OS in VirtualBox to cuckoo.conf
configuration file. For example, if you create a Guest OS named cuckoo1
, you have to write down cuckoo1
in the cuckoo.conf
configuration file. The most important part of all is not to forget to make a backup of the whole system and configurations.
In the next chapter, we will continue learning about Cuckoo Sandbox's features, such as analyzing PDF files, URLs, and binary files, Memory Forensic using Cuckoo Sandbox (using the Memory dump feature), and additional Memory Forensic using Volatility.
Change the font size
Change margin width
Change background colour