Reverse Engineering & Malware Analysis
Reverse Engineering & Malware Analysis
Understand attacker tools and malware to build robust detection, mitigation and attribution capabilities. From static analysis to dynamic sandboxing, we decode the techniques and objectives behind malicious code.
Understand attacker tools and malware to build robust detection, mitigation and attribution capabilities. From static analysis to dynamic sandboxing, we decode the techniques and objectives behind malicious code.
Scope
Static binary analysis, unpacking and deobfuscation
Dynamic behavior analysis in instrumented sandboxes (network, file, registry).
Script & macro analysis (Office, PowerShell), payload chains and C2 traffic analysis.
Methodology
Methodology
1
Sample Intake & Triage
Sample Intake & Triage
prioritize samples by risk and similarity to known families.
prioritize samples by risk and similarity to known families.
2
Static Analysis
Static Analysis
examine code, strings, imports, resources and obfuscation layers.
examine code, strings, imports, resources and obfuscation layers.
3
Dynamic Analysis
Dynamic Analysis
execute in isolated environments, monitor behavior, network callbacks and persistence mechanisms.
execute in isolated environments, monitor behavior, network callbacks and persistence mechanisms.
4
Behavioral Mapping
Behavioral Mapping
map IOCs, TTPs and C2 infrastructure and link to threat actors where possible.
map IOCs, TTPs and C2 infrastructure and link to threat actors where possible.
5
Detection & Remediation Support
Detection & Remediation Support
produce detection signatures (YARA, Suricata, Sigma), blocking rules and remediation guidance.
produce detection signatures (YARA, Suricata, Sigma), blocking rules and remediation guidance.
Who it’s for
Incident Response teams, SOCs, CERTs, and legal/compliance teams needing forensic evidence or improved detection.
Who it’s for
Incident Response teams, SOCs, CERTs, and legal/compliance teams needing forensic evidence or improved detection.
Deliverables
Technical analysis report (TTPs, IOCs, indicators, YARA/Suricata rules)
Malware kill-chain diagram and recommended detection signatures
Evidence package and timeline for legal/forensic use (if required)
Playbook for containment and eradication
Deliverables
Technical analysis report (TTPs, IOCs, indicators, YARA/Suricata rules)
Malware kill-chain diagram and recommended detection signatures
Evidence package and timeline for legal/forensic use (if required)
Playbook for containment and eradication
Typical outcomes & KPIs
New detection coverage (YARA/Sigma rules) deployed to SOC
Accurate attribution or clustering of samples to known campaigns
Reduced dwell time through faster detection of variant samples
Typical outcomes & KPIs
New detection coverage (YARA/Sigma rules) deployed to SOC
Accurate attribution or clustering of samples to known campaigns
Reduced dwell time through faster detection of variant samples
Optional add-ons
Long-term malware tracking and campaign monitoring
Integration of custom IoCs into your SIEM and endpoint agents
Forensic evidence collection support for legal proceedings
Optional add-ons
Long-term malware tracking and campaign monitoring
Integration of custom IoCs into your SIEM and endpoint agents
Forensic evidence collection support for legal proceedings
Get in Touch with Us
Get in Touch with Us
Do you have questions or want more information about our services?
We’re here to listen and support you.
Do you have questions or want more information about our services?
We’re here to listen and support you.
Write to Us
Write to Us
info@bucreative.it
Address
Address
Corso Vittorio Emanuele II, 6 – 10123 – Torino (Italy)
Corso Vittorio Emanuele II, 6 – 10123 – Torino (Italy)
Find us on Google Maps