Advent of Cyber 2025 Walkthrough - Malware Analysis - Egg-Xecutable
Автор: Mike Small
Загружено: 2025-12-12
Просмотров: 28
Описание:
Malware analysis is not about clicking tools and hoping for answers.
In this video, I walk through the Egg-Xecutable malware challenge from Advent of Cyber 2025 the way a professional security analyst would approach it in the real world.
We start with static analysis to safely extract clues from the executable, then move into dynamic analysis to observe how the malware behaves once it runs. Along the way, I explain why each step matters, what to look for, and how attackers commonly implement persistence and command-and-control.
This is a practical, analyst-focused walkthrough designed to help you think like a malware analyst, not just solve a CTF.
What you’ll learn in this video
How to extract meaningful strings from a suspicious executable
How static analysis reveals indicators without running malware
How to use dynamic analysis to observe real system changes
How persistence is commonly established using Windows registry run keys
How to identify outbound network activity and C2 communication
Tools covered
PEStudio for static inspection and string analysis
Procmon to monitor file, registry, and network activity
Regshot to detect system and registry changes before and after execution
Who this video is for
Cybersecurity students and self-learners
SOC analysts looking to understand malware behavior
Blue teamers expanding into malware analysis
Anyone working through Advent of Cyber challenges and wanting deeper insight
If you watch through the end, you’ll see how simple tooling and a disciplined process can quickly uncover persistence mechanisms, network protocols, and potential C2 infrastructure without reverse-engineering the entire binary.
Check out the rest of the Advent of Cyber walkthroughs on the channel and keep building real, hands-on security skills.
▶Sponsor
_______________________
Tandem Cyber Solutions - https://tandemcybersolutions.com/
▶Affiliate Links
_______________________
You can support the channel by using the affiliate links below.
HTB - https://hacktheboxltd.sjv.io/e1MxWO
_______________________
▶OTHER CHANNELS:
C-Suite Cyber Podcast / @c-suitecyberpodcast
_______________________
▶Come Hang Out:
Discord: / discord
_______________________
Chapters
00:00 Navigating Insecure Direct Object References
00:52 Principles of Malware Analysis
02:13 Dynamic Analysis and Tool Utilization
08:11 Capturing and Analyzing Malware Behavior
15:46 Exploring Breach Blocker and C2 Tools
Повторяем попытку...
Доступные форматы для скачивания:
Скачать видео
-
Информация по загрузке: