Skip to main content
  • Book
  • © 2020

Malware Analysis and Detection Engineering

A Comprehensive Approach to Detect and Analyze Modern Malware

Apress
  • A one-stop solution for malware analysis, reversing, and detection engineering

  • Covers the internal workings of detection engineering tools, including malware sandboxes, IDS/IPS, anti-virus, and Windowsnbinary instrumentation

  • Includes hands-on exercises that mimic malware behavior

Buy it now

Buying options

eBook USD 69.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 89.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

This is a preview of subscription content, log in via an institution to check for access.

Table of contents (25 chapters)

  1. Front Matter

    Pages i-xxxiv
  2. Introduction

    1. Front Matter

      Pages 1-1
    2. Introduction

      • Abhijit Mohanta, Anoop Saldanha
      Pages 3-24
    3. Malware Analysis Lab Setup

      • Abhijit Mohanta, Anoop Saldanha
      Pages 25-50
  3. OS and System Fundamentals

    1. Front Matter

      Pages 51-51
    2. Files and File Formats

      • Abhijit Mohanta, Anoop Saldanha
      Pages 53-69
    3. Virtual Memory and the Portable Executable (PE) File

      • Abhijit Mohanta, Anoop Saldanha
      Pages 71-122
    4. Windows Internals

      • Abhijit Mohanta, Anoop Saldanha
      Pages 123-162
  4. Malware Components and Analysis

    1. Front Matter

      Pages 163-163
    2. Malware Components and Distribution

      • Abhijit Mohanta, Anoop Saldanha
      Pages 165-188
    3. Malware Packers

      • Abhijit Mohanta, Anoop Saldanha
      Pages 189-211
    4. Persistence Mechanisms

      • Abhijit Mohanta, Anoop Saldanha
      Pages 213-236
    5. Network Communication

      • Abhijit Mohanta, Anoop Saldanha
      Pages 237-265
    6. Code Injection, Process Hollowing, and API Hooking

      • Abhijit Mohanta, Anoop Saldanha
      Pages 267-329
    7. Stealth and Rootkits

      • Abhijit Mohanta, Anoop Saldanha
      Pages 331-373
  5. Malware Analysis and Classification

    1. Front Matter

      Pages 375-375
    2. Static Analysis

      • Abhijit Mohanta, Anoop Saldanha
      Pages 377-402
    3. Dynamic Analysis

      • Abhijit Mohanta, Anoop Saldanha
      Pages 403-431
    4. Memory Forensics with Volatility

      • Abhijit Mohanta, Anoop Saldanha
      Pages 433-476
    5. Malware Payload Dissection and Classification

      • Abhijit Mohanta, Anoop Saldanha
      Pages 477-521

About this book

Discover how the internals of malware work and how you can analyze and detect it. You will learn not only how to analyze and reverse malware, but also how to classify and categorize it, giving you insight into the intent of the malware. Malware Analysis and Detection Engineering is a one-stop guide to malware analysis that simplifies the topic by teaching you undocumented tricks used by analysts in the industry. You will be able to extend your expertise to analyze and reverse the challenges that malicious software throws at you. 

The book starts with an introduction to malware analysis and reverse engineering to provide insight on the different types of malware and also the terminology used in the anti-malware industry. You will know how to set up an isolated lab environment to safely execute and analyze malware. You will learn about malware packing, code injection, and process hollowing plus how to analyze, reverse, classify, and categorize malware using static and dynamic tools. You will be able to automate your malware analysis process by exploring detection tools to modify and trace malware programs, including sandboxes, IDS/IPS, anti-virus, and Windows binary instrumentation.

The book provides comprehensive content in combination with hands-on exercises to help you dig into the details of malware dissection, giving you the confidence to tackle malware that enters your environment.




What You Will Learn
  • Analyze, dissect, reverse engineer, and classify malware
  • Effectively handle malware with custom packers and compilers
  • Unpack complex malware to locate vital malware components and decipher their intent
  • Use various static and dynamic malware analysis tools   
  • Leverage the internals of various detection engineering tools to improve your workflow         
  • Write Snort rules and learn to use them with Suricata IDS 



Who This Book Is For


Security professionals, malware analysts, SOC analysts, incident responders, detection engineers, reverse engineers, and network security engineers




"This book is a beast! If you're looking to master the ever-widening field of malware analysis, look no further. This is the definitive guide for you."  Pedram Amini, CTO Inquest; Founder OpenRCE.org and ZeroDayInitiative


Authors and Affiliations

  • Independent Cybersecurity Consultant, Bhubaneswar, India

    Abhijit Mohanta

  • Independent Cybersecurity Consultant, Mangalore, India

    Anoop Saldanha

About the authors

Abhijit Mohanta is an independent cybersecurity consultant and corporate trainer who has worked extensively in malware reverse engineering, vulnerability research, anti-virus engine development, anti-malware signature writing, and sandbox development. He has worked with the Symantec, McAfee, and Juniper Networks anti-malware labs. He holds several patents. He blogs regularly and has been a speaker at security conferences and workshops. His articles have been republished and quoted in a number of blogs and whitepapers, including eForensics magazine. He is also the author of the book Preventing Ransomware: Understand, Prevent, and Remediate Ransomware Attacks.

Anoop Saldanha is one of the core authors of the Suricata Intrusion Detection and Prevention System, funded by the US Department of Homeland Security (DHS). He works as an independent security consultant and as a corporate security trainer. He designs and develops various detection technologies to secure both the host and the network, ranging from network security tools such as IDS/IPS to malware sandboxes, malware analysis tools, firewalls, and endpoints. He holds multiple patents in the field of security and speaks at security conferences and workshops. He has previously worked in threat research labs and detection engineering teams at RSA Security, Juniper Networks, Cyphort Cybersecurity, and various other cybersecurity startups.


Bibliographic Information

Buy it now

Buying options

eBook USD 69.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 89.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access