SOC Malware Analysis – Malicious XLS Investigation via VirusTotal (LetsDefend Remote Working)
Автор: InkSec
Загружено: 2026-01-25
Просмотров: 6
Описание:
SOC-style malware analysis of a malicious Excel document from the LetsDefend Remote Working malware challenge.
Summary:
Suspicious XLS file delivered via compressed archive (password-protected)
Static analysis performed without live execution
VirusTotal used as the primary analysis source
File creation timestamp (UTC) identified from metadata
Antivirus detection name confirmed via Bitdefender engine
Dropped files enumerated through VirusTotal behaviour analysis
EMF payload identified and SHA-256 hash extracted
External spyware download URL identified via VT relations
Full challenge completed using intelligence-driven analysis techniques
This video demonstrates how VirusTotal alone can be used to answer malware investigation questions, including file lineage, dropped artifacts, AV detections, and outbound infrastructure — a realistic approach often required when payloads are no longer hosted.
VirusTotal analysis:
https://www.virustotal.com/gui/file/7...
This investigation highlights static malware analysis, threat intelligence correlation, and IOC extraction within a SOC workflow.
For educational and defensive security purposes only.
#SOC
#LetsDefend
#MalwareAnalysis
Повторяем попытку...
Доступные форматы для скачивания:
Скачать видео
-
Информация по загрузке: