Malware memory analysis for non-specialists – Investigating publicly available memory images for Prolaco and SpyEye

PDF

Authors
  1. Carbone, R.
Corporate Authors
Defence R&D Canada - Valcartier, Valcartier QUE (CAN)
Abstract
This technical memorandum examines how an investigator can analyse an infected Windows memory dump. The author investigates how to carry out such an analysis using Volatility and other investigative tools, including data carving utilities and anti-virus scanners. Volatility is a popular and evolving open source-based memory analysis framework upon which the author has proposed a memory-specific methodology for aiding fellow novice memory analysts. The author examines how Volatility can be used to find evidence and indicators of infection. This technical memorandum is the second in a series concerning Windows malware-based memory analysis. This current work examines two memory images infected with Prolaco and SpyEye, respectively.

Il y a un résumé en français ici.

Report Number
DRDC-VALCARTIER-TM-2013-155 — Technical Memorandum
Date of publication
01 Oct 2013
Number of Pages
120
DSTKIM No
CA040031
CANDIS No
801025
Format(s):
Electronic Document(PDF)

Permanent link

Document 1 of 1

Date modified: