
This lesson requires Loopus Pro access. Upgrade to unlock all courses, labs, and challenges.
Static analysis examines malware without execution. Safe and fast, static analysis reveals structure, indicators, and sometimes functionality.
File hashes - Calculate MD5, SHA1, SHA256 for identification.
Packing detection - Packed files require unpacking before analysis. Tools like Detect It Easy identify common packers.
Strings reveal malware intent:
Encoded or packed malware hides strings. Unpack or analyze dynamically if static extraction yields little.
For Windows executables:
Headers - Compilation timestamp, sections, characteristics.
Imports - What functions does it use?
Resources - Embedded files, icons, version information.
Tools: PE Studio, CFF Explorer, pestudio
Office documents require different approaches:
Embedded macros - Extract and analyze VBA code.
OLE streams - Look for embedded executables or scripts.
DDE links - May execute commands without macros.
Tools: oletools, oledump.py
Document findings for detection:
Record analysis process:
What is dynamic malware analysis?
What safe environment is used for analysis?
What behaviors indicate malware?
What term describes reaching out to C2?
Found the flag? Submit it below to complete this lesson.
Format: LOOPUS{...}