MALWARE SERVICE

Purpose

  • Identify malware functions, assess the nature and extent of the threat.
  • Give signs of identification – IoC of malicious code to serve the process of scanning and detecting infected systems.
  • Providing solutions to overcome and eliminate malicious code, minimizing damage to infected systems.

Test list

  • Number of malware samples to analyze

Implementation methods

  • Static analysis: Use specialized tools to analyze, decompile, and debug malicious code samples in a simulated environment.
  • Dynamic analysis (behaviour analysis): Executes malicious files in a secure emulated environment (sandbox) to identify behaviours generated by malicious code.

Outcomes Result

The results report includes the following contents:

  • Overview of purpose and scope of implementation
  • Summary of approach, method of implementation
  • Summarize the results of detected security issues, malicious code functions, and the level of danger related to malicious code
  • Propose a radical remediation plan or a plan to minimize damage to infected systems.

Human resources for project implementation

  • Each malware sample needs 1 Expert level personnel to perform the analysis. On average, it takes 5-7 mandays for analysis, two mandays for writing removal tools, two mandays for making analysis reports.

Other Services