Hunting malware in memory
Jeremy Scott decided to conduct a memory analysis using a completely open collection of tools called “Volatility.” We will be able to follow it step by step in this blog. Jeremy will try to answer some simple questions in an attempt to identify malicious code.
Since memory analysis is extremely important for responding to incidents, and it can help identify malicious code and explain how the pattern was used in a suspicious system.
You can find and extract forensic artifacts from memory with the help of Volatility. Thanks to this we can do a lot.