Tips for Reverse-Engineering Malicious Code
Lenny Zeltser
SEPTEMBER 7, 2017
This cheat sheet outlines tips for reversing malicious Windows executables via static and dynamic code analysis with the help of a debugger and a disassembler. To print it, use the one-page PDF version; you can also edit the Word version to customize it for you own needs. Overview of the Code Analysis Process. Examine static properties of the Windows executable for initial assessment and triage.
Let's personalize your content