L
LabZero
Thread author
Firewall: GlassWire Network Monitor Pro
Backup and restore: Macrium Reflect Free and some complete images.
Speecy: HW monitor
Shadow Defender, Sandboxie.
Hello guys, I decided to dramatically increase my security level by building a PC entirely and exclusively dedicated to Malware Analysis.
This PC does not contain any personal or sensitive information.
Allocated virtual systems for the analysis lab: Windows 10 Home inside VirtualBox 5.1.4
Behavioral and static analysis tools
Real-time threat assessment: WebInspector
Historical reputation data: URLVoid and MxToolbox
Other tools
This configuration is intentionally sparse because I want to focus on malware, other apps will be added in the future.
Backup and restore: Macrium Reflect Free and some complete images.
Speecy: HW monitor
Shadow Defender, Sandboxie.
Hello guys, I decided to dramatically increase my security level by building a PC entirely and exclusively dedicated to Malware Analysis.
This PC does not contain any personal or sensitive information.
Allocated virtual systems for the analysis lab: Windows 10 Home inside VirtualBox 5.1.4
Behavioral and static analysis tools
- File system and registry monitoring: Process Monitor
- Process monitoring: Process Explorer
- Network monitoring: Wireshark
- Code-analysis tools, disassembler and debugger: OllyDbg and IDA Pro Freeware, PE Studio, IlSpy
- Change detection: Regshot
- Memory dumper: OllyDumpEx
Real-time threat assessment: WebInspector
Historical reputation data: URLVoid and MxToolbox
Other tools
- Visual Studio Express : the main Integrated Development Environment (IDE) from Microsoft.
- Code::Blocks: a free C++ IDE built to meet the most demanding needs of its users. It is designed to be very extensible and fully configurable and has multiple compiler support (default GCC).
- Detect it Easy: another one PE identifier
- ProcDump: a command-line utility whose primary purpose is monitoring an application for CPU spikes and generating crash dumps during a spike that an administrator or developer can use to determine the cause of the spike.
- Java Decompiler
- Spy++: spying tool with point-and-click Handle/ID grabbing
- HxD Hex and Disk Editor for editing and viewing binary files and hard disk sectors.
This configuration is intentionally sparse because I want to focus on malware, other apps will be added in the future.
Last edited by a moderator: