One slide overview of the malware analysis process and it's relation to other defensive security operations.
Malware AnalysisProcessInitial AssessmentStructured AnalysisReport ProductionDynamic AnalysisProve/Disprove HypothesisStudy Runtime BehaviourIdentify Goals/ObjectivesSummarize FindingsInclude EvidenceInclude MethodologyStatic AnalysisIdentify InfrastructureIdentify Code LibrariesIdentify Packed FilesOpportunities for DetectionIncident ResponseThreat HuntingMalware ResearchCyber Threat Intelligence
View Slide