Description
Course info
Level
Intermediate
Updated
Nov 15, 2019
Duration
1h 30m
Description

In this course, Malware Analysis and Detection: TrickBot, Aaron Rosenmund and Tyler Hudak discuss the malware TrickBot, a popular malware used by attackers. By the end of this course, you will learn how TrickBot works, what it does to computers it compromises, and what tools you can use to detect it on your hosts and network.

About the author
About the author

Tyler Hudak has more than 15 years of experience performing malware analysis, computer forensics, and incident response for multiple organizations. He loves sharing the knowledge he has gained on these topics in his presentations and classes!

More from the author
Setting Up a Malware Analysis Lab
Intermediate
1h 26m
Nov 21, 2019
Hunting for Fileless Malware
Intermediate
1h 41m
Dec 18, 2018
More courses by Tyler Hudak
About the author

Aaron M. Rosenmund is a cyber security operations and incident response subject matter expert, with a background in federal and business system administration, virtualization and automation.

More from the author
Setting Up a Malware Analysis Lab
Intermediate
1h 26m
Nov 21, 2019
More courses by Aaron Rosenmund
Section Introduction Transcripts
Section Introduction Transcripts

Course Overview
[Autogenerated] over one. I'm Erin Rosamund, a staff author with plural site focused on security operations. Instant response in a part time member of the Florida Air National Guard working in defense of cyber operations. Hey, this is Tyler. Predict. I knew Incident Response is my primary job, and M a plural site author. In my job, I've come across the trick bottom our more times than I can count. This is a dangerous piece of malware that, if left unchecked in your environment, can lead to very bad things happening. Our developers never rest. Neither can we. Trick Bob has research recently earning headlines like Trick button snares 250 million passwords in town in some very large infection. Combined with its module arised employment per device encryption, this Mauer has indiscriminately spread far and wide falling commodity Mauer trends. It is being leveraged as an intermediate stage that's often followed by ransomware, and it seems to be under frequent development in this course will cover what Trippi is. What is used for and how it works also cover how you can analyze what does on systems that compromises as well as the network trafficking generates bythe end this play by play, you will have some intermediate indicators to search through your environment for trick about compromise and the confidence to follow the same dynamic analysis process for new variants of trick pot as they're developed, employed in the wild. We hope you'll join us on this journey to learn how to analyze trick, but in this play by play at Coral site.