Now Reading
Hunting malware in memory

Hunting malware in memory

by Igor Mikhaylov2017-10-30

Jeremy Scott decided to conduct a memory analysis using a completely open collection of tools called “Volatility.” We will be able to follow it step by step in this blog. Jeremy will try to answer some simple questions in an attempt to identify malicious code.
Since memory analysis is extremely important for responding to incidents, and it can help identify malicious code and explain how the pattern was used in a suspicious system.

You can find and extract forensic artifacts from memory with the help of Volatility. Thanks to this we can do a lot.



Leave a Response

Please enter the result of the calculation above.