
Cuckoo Malware Analysis

In this chapter, we will discuss how to read the analysis output which was explained in the previous chapter. We will also discuss about APT1 attack (I think you must be familiar with the term APT1, which is recently being discussed quite often). If you have never heard of it you should read the Advanced Persistent Threat (APT) and Insider Threat blog post at http://cyber-defense.sans.org/blog/2012/10/23/advanced-persistent-threat-apt-and-insider-threat. One of the discussions about APT is written by Mandiant, an IT security researching company. The released paper was a shocking report about APT1 attacks. In this report, Mandiant explained about a number of sophisticated malware that were being used for a few targeted companies or organizations. These kinds of malware not only steal data, but also spy on the activities of our daily life. We will try to analyze some sample APT1 malware that was used in the attack using Cuckoo Sandbox, and...
Change the font size
Change margin width
Change background colour