Colonelyobo_2022_nov-dec.zip
: Use of tools like malheur for unsupervised machine learning analysis, focusing on "prototypes" to classify malware behavior. Common Analysis Techniques Used
The zip file is a collection of malware analysis reports and artifacts associated with the Fall 2022 Introduction to Information Security (CS 6035) curriculum at Georgia Tech. Overview of Content ColonelYobo_2022_Nov-Dec.zip
For individuals looking for specific Capture the Flag (CTF) solutions involving zip files from this era, similar challenges often required bypassing encryption through known-plaintext attacks using tools like bkcrack . : Use of tools like malheur for unsupervised
: Applying algorithms such as Random Forest or Gradient Boosting to classify malware types based on extracted features like file size or network connections. : Applying algorithms such as Random Forest or
: Documentation of how the malware attempts to bypass Personal Firewalls (PFW) or Host Intrusion Prevention Systems (HIPS).
: Analysis of "hooks" in registry keys or values designed to protect autostart capabilities for the malware.