Detailed Malware Investigation Report: Analysis of Lab 6 Scenario
VerifiedAdded on  2022/09/28
|4
|1125
|29
Report
AI Summary
This report details a malware investigation conducted on a client's computer, Mr. ImaVictim, who suspected a malware attack after downloading and running a file named "server.exe." The investigation involved live forensic analysis using tools like Wireshark and command prompt commands to gather system information, identify suspicious processes, and analyze network connections. The report documents the timeline of the infection, including the download of the malicious file, the opening of a webpage, and the attacker's remote access. Through Wireshark analysis, the report pinpoints the HTTP requests that initiated the malware download and the subsequent keylogging activity, revealing the exfiltration of sensitive information. The investigation concludes with the identification of the malicious application, the attacker's location, and the preservation of evidence for authorities. The report highlights the importance of proactive security measures and forensic techniques in responding to cyber threats and securing sensitive data.
1 out of 4




