June 24, 2024, 6:52 p.m. | C W

System Weakness - Medium systemweakness.com

**Executive Summary**

This document outlines a systematic approach to analyzing potentially malicious software using static and dynamic analysis techniques. The process begins with static analysis, where tools like CMDR and Floss are utilized to inspect the sample for any discernible information. If no relevant data is found, the analysis proceeds to dynamic analysis.

Dynamic analysis involves running the sample in a controlled environment, such as REMnux with INETSIM and Wireshark running to capture network traffic. By observing DNS queries and …

analysis cybersecurity data discernible document dynamic dynamic analysis executive floss found information information security iocs linux malicious malicious software process relevant reverse reverse shell sample script shell shell script software static static analysis static and dynamic analysis techniques tools using

Principal QA Engineer - Data Storage and Ingestion pipelines (Cortex)

@ Palo Alto Networks | Tel Aviv-Yafo, Israel

Principal Software Engineer - .NET / API

@ Commonwealth Bank | Sydney, NSW - CBP South, 11 Harbour Street

AVP | Governance

@ MUFG | Watermark - 410 North Scottsdale Road

Tech Lead - Full Stack - Défense & Sécurité - Lille

@ Sopra Steria | Villeneuve-d'Ascq, France

Windows / Linux Systems Administrator

@ General Dynamics Information Technology | USA FL MacDill AFB - MacDill AFB (FLC007)

Graduate Software Engineer (C, C++)- HP Wolf Security

@ HP | UKC01 - Cambridge, United Kingdom (UKC01)