ROADMAP MALWARE ANALYST/REVERSE ENGINEER TOÀN DIỆN¤
1. FOUNDATIONS - NỀN TẢNG CƠ BẢN¤
1.1 Computer Architecture¤
- CPU architecture (x86, x64, ARM)
- Registers (General purpose, Special purpose)
- Memory organization (Stack, Heap, Data, Text segments)
- Memory addressing modes
- Cache hierarchy (L1, L2, L3)
- Virtual memory
- Paging và segmentation
- Instruction pipeline
- RISC vs CISC
- Endianness (Little-endian, Big-endian)
1.2 Operating Systems Internals¤
Windows Internals¤
- Windows architecture overview
- Kernel mode vs User mode
- Windows API (Win32 API, Native API)
- Process và Thread management
- Virtual memory management
- Handle tables
- Object Manager
- Registry internals
- File system (NTFS internals)
- PE (Portable Executable) format deep dive
- DLL loading mechanism
- Windows security (ACLs, SIDs, Tokens)
- Windows services
- Driver model (WDM, WDF)
- Debugging APIs
- Exception handling (SEH, VEH)
- Critical sections và synchronization
- Hooks (IAT hooks, Inline hooks, SSDT hooks)
Linux Internals¤
- Linux kernel architecture
- System calls
- ELF (Executable and Linkable Format)
- Process management
- Memory management
- File systems (ext4, etc.)
- Kernel modules
- /proc filesystem
- Signals
- Inter-process communication
- Dynamic linking
- ptrace mechanism
- LD_PRELOAD hooking
1.3 Networking Fundamentals¤
- TCP/IP stack
- Socket programming
- HTTP/HTTPS protocols
- DNS protocol
- Common malware protocols
- Network traffic analysis
- Packet capture và analysis
- C2 communication patterns
- TOR và anonymity networks
- Proxy và tunneling
1.4 File Formats¤
- PE format (DOS Header, NT Headers, Sections, Import/Export tables)
- ELF format
- Mach-O format (macOS)
- Office file formats (OOXML, OLE)
- PDF format
- Archive formats (ZIP, RAR, 7z)
- Image formats (JPEG, PNG với steganography)
- Executable packers và compression
2. PROGRAMMING LANGUAGES¤
2.1 Assembly Language - CRITICAL¤
- x86 Assembly
- Instruction set (MOV, ADD, SUB, MUL, DIV, etc.)
- Arithmetic operations
- Logical operations
- Bitwise operations
- Control flow (JMP, JE, JNE, JG, JL, CALL, RET)
- Stack operations (PUSH, POP)
- String operations
-
Addressing modes
-
x64 Assembly (x86-64)
- 64-bit registers (RAX, RBX, RCX, RDX, etc.)
- Calling conventions (Microsoft x64, System V AMD64 ABI)
- Shadow space
- Parameter passing
-
RIP-relative addressing
-
ARM Assembly
- ARM instruction set
- Thumb mode
- ARM64/AArch64
- NEON instructions
-
Mobile malware analysis
-
MIPS Assembly (optional)
- IoT device malware
2.2 C/C++ - ESSENTIAL¤
- C language mastery
- Pointers và memory management
- Structures và unions
- Function pointers
- Bit manipulation
- Preprocessor directives
-
Standard library
-
C++ specifics
- Classes và objects
- Virtual functions và vtables
- Templates
- STL
- Exception handling
- RTTI (Run-Time Type Information)
-
Name mangling
-
Compiler behavior
- Optimization levels
- Compiler-specific features
- Inline assembly
- Intrinsics
2.3 Python - AUTOMATION¤
- Python for malware analysis
- Scripting automation
- Binary parsing libraries
- pefile (PE analysis)
- pyelftools (ELF analysis)
- capstone (Disassembly)
- unicorn (Emulation)
- yara-python
- volatility plugins
- Network analysis (scapy)
- Web scraping (requests, beautifulsoup)
- API interaction
- Report generation
- IOC extraction scripts
- Custom tool development
2.4 PowerShell¤
- PowerShell malware analysis
- Deobfuscation scripts
- PowerShell Empire understanding
- Obfuscation techniques
- Logging và detection
- AMSI bypass techniques
- PowerShell internals
2.5 Other Languages¤
- JavaScript/VBScript (for macro/script-based malware)
- Delphi (common in malware)
- Visual Basic (legacy malware)
- .NET (C#, VB.NET)
- Java (Android malware)
- Go (emerging in malware)
- Rust (emerging in malware)
3. REVERSE ENGINEERING FUNDAMENTALS¤
3.1 Disassemblers & Decompilers¤
IDA Pro - INDUSTRY STANDARD¤
- Interface navigation
- Graph view vs Text view
- Cross-references (Xrefs)
- Function analysis
- Structure definitions
- Enums và constants
- IDC scripting
- IDAPython scripting
- Hex-Rays decompiler
- Debugging với IDA
- Plugins (FindCrypt, Keypatch, etc.)
- Signature generation (FLIRT)
- Type libraries
- Collaborative RE (IDA Teams)
Ghidra - FREE POWERFUL ALTERNATIVE¤
- Project management
- CodeBrowser interface
- Decompiler usage
- Scripting (Java, Python)
- Data type manager
- Function graphs
- Symbol trees
- Version tracking
- Ghidra plugins
- Collaborative features
- P-Code analysis
- Custom processors
Binary Ninja¤
- Linear disassembly
- MLIL, LLIL, HLIL views
- Python API
- Plugin development
- Collaborative RE
- Custom architectures
Radare2/Rizin¤
- Command-line RE
- r2pipe scripting
- Visual mode
- Debugging capabilities
- Cutter GUI
- ESIL (Evaluable Strings Intermediate Language)
Other Tools¤
- Hopper Disassembler (macOS)
- Capstone (disassembly framework)
- Unicorn (CPU emulator)
- Triton (symbolic execution)
3.2 Debuggers - ESSENTIAL¤
x64dbg/x32dbg (Windows)¤
- Breakpoints (Software, Hardware, Memory)
- Step execution (Step into, Step over, Step out)
- Register modification
- Memory inspection và modification
- Scripting (x64dbgpy)
- Plugins (OllyDumpEx, Scylla, etc.)
- Conditional breakpoints
- Tracing
- Call stack analysis
- Thread debugging
WinDbg (Windows Kernel/User)¤
- Commands mastery (k, u, r, dt, etc.)
- Extension commands (!analyze, !peb, !teb)
- Symbol resolution
- Memory analysis
- Kernel debugging
- Crash dump analysis
- Time Travel Debugging (TTD)
- JavaScript scripting
GDB (Linux)¤
- GDB commands (break, run, continue, step, next, print)
- GEF/PEDA/pwndbg enhancements
- Core dump analysis
- Remote debugging
- Python scripting
- Reverse debugging (rr)
OllyDbg (legacy but still useful)¤
- Classic debugging
- Plugins ecosystem
- Script debugging
Immunity Debugger¤
- Python API
- Exploit development
- mona.py plugin
3.3 Dynamic Analysis Tools¤
Sandboxes¤
- Cuckoo Sandbox
- Setup và configuration
- Custom analyzers
- Signature creation
- Report interpretation
- Network analysis
-
Memory dumps
-
Any.run (online)
- Joe Sandbox
- Hybrid Analysis
- CAPE Sandbox
- Custom sandbox development
Process Monitors¤
- Process Monitor (Procmon)
- Filtering techniques
- Registry monitoring
- File system monitoring
- Network monitoring
-
Process/Thread monitoring
-
Process Explorer
- Process tree
- Handle analysis
- DLL view
- String analysis
-
VirusTotal integration
-
API Monitor
- API hooking
- Call stack capture
- Parameter monitoring
- Filter configuration
Network Analysis¤
- Wireshark
- Protocol analysis
- Filter expressions
- Follow streams
- Statistics
-
Custom dissectors
-
Fiddler
- Burp Suite
- tcpdump
- NetworkMiner
- FakeNet-NG (malware network simulation)
- INetSim (Internet service simulation)
System Monitoring¤
- Sysmon
- Configuration
- Event log analysis
-
IOC detection
-
Autoruns
- RegShot (registry snapshot comparison)
- ProcDOT (visual analysis)
3.4 Static Analysis Techniques¤
- String analysis (strings, FLOSS)
- Import/Export table analysis
- Resource analysis
- Entropy analysis (detect packed/encrypted sections)
- Header analysis
- Section analysis
- Signature scanning (YARA)
- Hashing (MD5, SHA-256, ssdeep, imphash)
- Certificate analysis
- Metadata extraction
- Pattern matching
4. MALWARE ANALYSIS METHODOLOGY¤
4.1 Basic Static Analysis¤
- File identification (file command, TrID)
- Hash calculation và lookup (VirusTotal, MalwareBazaar)
- Packer detection (PEiD, Detect It Easy, Exeinfo PE)
- String extraction (strings, FLOSS - FLARE Obfuscated String Solver)
- PE analysis (PEStudio, PE-bear, pestudio)
- Import/Export analysis
- Resource extraction
- Signature creation (YARA rules)
- Metadata analysis
- Digital signature verification
4.2 Basic Dynamic Analysis¤
- Safe execution environment setup
- Virtual machine configuration
- Snapshot management
- Behavioral monitoring
- Process creation monitoring
- File system changes
- Registry modifications
- Network connections
- Mutex creation
- Service installation
- Persistence mechanisms
- Screenshot capture
- Behavioral signatures
4.3 Advanced Static Analysis¤
- Disassembly
- Code flow analysis
- Control flow graphs
- Data flow analysis
- Function identification
- Algorithm recognition
- Cryptography identification
- Anti-analysis technique detection
- Code optimization recognition
- Compiler artifact identification
4.4 Advanced Dynamic Analysis¤
- Debugging malware
- Breakpoint strategies
- Memory dumping
- Unpacking trong runtime
- API hooking
- Function tracing
- Kernel debugging
- Rootkit analysis
- Memory forensics
- Decryption trong memory
- Code injection analysis
5. MALWARE TYPES & FAMILIES¤
5.1 Malware Categories¤
Viruses¤
- File infectors
- Boot sector viruses
- Macro viruses
- Polymorphic viruses
- Metamorphic viruses
- Cavity viruses
- Companion viruses
Worms¤
- Network worms
- Email worms
- IM worms
- USB worms
- Self-replication mechanisms
- Propagation techniques
Trojans¤
- Backdoor trojans
- Downloader trojans
- Dropper trojans
- RATs (Remote Access Trojans)
- Banking trojans
- Infostealer trojans
- Proxy trojans
Ransomware¤
- Crypto-ransomware
- Locker-ransomware
- Master Boot Record (MBR) ransomware
- Encryption algorithms analysis
- Ransom note analysis
- Payment mechanisms
- Decryption possibilities
- Notable families (WannaCry, Ryuk, REvil, LockBit)
Spyware¤
- Keyloggers
- Screen capture malware
- Credential stealers
- Session hijackers
- Form grabbers
- Clipboard monitors
Rootkits¤
- User-mode rootkits
- Kernel-mode rootkits
- Bootkit/Bootkits
- Firmware rootkits
- Hypervisor rootkits
- Direct Kernel Object Manipulation (DKOM)
- SSDT hooking
- IRP hooking
- IDT hooking
Botnets¤
- Bot architecture
- C2 communication
- DDoS capabilities
- Spam engines
- Credential stuffing
- Cryptomining
- Notable botnets (Mirai, Emotet, TrickBot)
APT Malware¤
- Nation-state malware
- Zero-day exploits
- Fileless malware
- Living-off-the-land binaries
- Advanced persistence
- Lateral movement tools
- Data exfiltration
- Notable APT groups malware
Mobile Malware¤
- Android malware
- iOS malware
- Mobile banking trojans
- SMS trojans
- Premium SMS fraud
- Repackaged apps
- Adware
IoT Malware¤
- Router malware
- Camera malware
- Smart device malware
- Firmware implants
5.2 Notable Malware Families (Study Cases)¤
- Stuxnet (ICS/SCADA worm)
- WannaCry (Ransomware worm)
- NotPetya (Destructive wiper)
- Emotet (Botnet/Downloader)
- TrickBot (Banking trojan)
- Ryuk (Ransomware)
- Zeus/Zbot (Banking trojan)
- Carbanak (APT banking malware)
- PlugX (APT RAT)
- Cobalt Strike (Legitimate tool misused)
- Mimikatz (Credential dumper)
- Gh0st RAT
- DarkComet RAT
- njRAT
- Poison Ivy
- BlackEnergy
- Industroyer/CrashOverride
- Lazarus group malware
- APT28/Fancy Bear malware
- APT29/Cozy Bear malware
6. ANTI-ANALYSIS TECHNIQUES¤
6.1 Anti-Debugging¤
- IsDebuggerPresent API
- CheckRemoteDebuggerPresent
- NtQueryInformationProcess
- PEB BeingDebugged flag
- PEB NtGlobalFlag
- Heap flags
- INT 3 detection
- INT 2D detection
- Software breakpoint detection
- Hardware breakpoint detection
- Timing checks (RDTSC, GetTickCount, QueryPerformanceCounter)
- Exception-based anti-debugging
- TLS callbacks
- Self-debugging
- Parent process check
- SeDebugPrivilege check
6.2 Anti-VM/Anti-Sandbox¤
- VMware detection (VMware Tools, registry keys, files)
- VirtualBox detection
- QEMU detection
- Hyper-V detection
- CPUID checks
- MAC address checks
- Hardware checks (disk size, RAM)
- Timing attacks
- User interaction checks (mouse movement, clicks)
- Sleep acceleration detection
- Artifact checks (specific files, processes)
- Number of processes check
- Temperature sensors
- USB devices count
6.3 Anti-Disassembly¤
- Junk code insertion
- Opaque predicates
- Control flow flattening
- Dead code insertion
- Impossible disassembly
- Function pointer obfuscation
- Overlapping instructions
- Self-modifying code
- Polymorphic code
- Metamorphic code
6.4 Code Obfuscation¤
- String encryption
- API obfuscation (API hashing, dynamic API resolution)
- Control flow obfuscation
- Data obfuscation
- Instruction substitution
- Code virtualization
- Packing/Crypting
- Garbage code insertion
- Dead code insertion
6.5 Packing & Crypting¤
- UPX
- ASPack
- PECompact
- Themida
- VMProtect
- Enigma Protector
- Code virtualizers
- Custom packers
- Unpacking techniques
- Manual unpacking
- Automated unpacking (OEP finding)
6.6 Bypassing Anti-Analysis¤
- Patching anti-debug checks
- Environment manipulation
- Timing manipulation
- Emulation vs virtualization
- Bare metal analysis
- Kernel debugging
- Hardware-assisted virtualization detection bypass
- ScyllaHide plugin
- TitanHide driver
- Pafish (test environment detection)
7. MEMORY FORENSICS¤
7.1 Memory Acquisition¤
- Live memory acquisition
- DumpIt
- FTK Imager
- WinPmem
- LiME (Linux Memory Extractor)
- Memory dump formats (raw, crash dump, hibernation file)
7.2 Volatility Framework - ESSENTIAL¤
- Volatility 2 vs Volatility 3
- Profile selection/creation
- Process analysis (pslist, psscan, pstree)
- Network connections (netscan, connections, connscan)
- DLL analysis (dlllist, ldrmodules)
- Handle analysis (handles)
- Registry analysis (hivelist, printkey)
- File extraction (dumpfiles, memdump)
- Malware detection (malfind, ldrmodules)
- Rootkit detection (psxview, modscan)
- Timeline creation (timeliner)
- Plugin development
- Custom plugins for specific malware
7.3 Memory Analysis Techniques¤
- Process hiding detection
- Code injection detection
- Hollowing detection
- Hooking detection
- Hidden network connections
- Orphan threads
- Suspicious memory regions
- Encrypted/encoded data in memory
- Credential extraction
- Decrypted strings
- Unpacked code
- Configuration extraction
7.4 Other Memory Tools¤
- Rekall
- Redline (FireEye)
- MANDIANT Memoryze
- WinDbg (kernel debugging và crash dumps)
- GDB (Linux memory)
8. CRYPTOGRAPHY IN MALWARE¤
8.1 Cryptographic Concepts¤
- Symmetric encryption (AES, DES, 3DES, RC4, Blowfish, ChaCha20)
- Asymmetric encryption (RSA, ECC, ElGamal)
- Hashing (MD5, SHA-1, SHA-256, SHA-512)
- Digital signatures
- Key derivation functions
- Block cipher modes (ECB, CBC, CFB, OFB, CTR, GCM)
- Stream ciphers
- Custom encryption algorithms
8.2 Identifying Cryptography¤
- FindCrypt plugin
- Entropy analysis
- Constant recognition
- Algorithm fingerprinting
- S-box identification
- Cryptographic API usage
8.3 Cryptanalysis Basics¤
- Known plaintext attacks
- Chosen plaintext/ciphertext attacks
- Implementation flaws
- Weak keys
- Key reuse
- Poor random number generation
- ECB mode weaknesses
- Custom crypto weaknesses
8.4 Decryption Techniques¤
- Static key extraction
- Dynamic key extraction
- Memory dump analysis
- Traffic capture analysis
- Ransomware decryption (when possible)
- Configuration decryption
9. ADVANCED MALWARE TECHNIQUES¤
9.1 Code Injection¤
- DLL Injection (CreateRemoteThread, QueueUserAPC, SetWindowsHookEx)
- Process Hollowing (RunPE)
- Atom Bombing
- Process Doppelgänging
- Thread Execution Hijacking
- Reflective DLL Injection
- PE Injection
- APC Injection
- Extra Window Memory Injection
- NTDLL Injection
- Early Bird Injection
- TLS Callback Injection
9.2 Persistence Mechanisms¤
- Registry Run keys
- Scheduled tasks
- Services
- WMI event subscriptions
- COM object hijacking
- AppInit_DLLs
- AppCertDLLs
- Image File Execution Options
- Netsh helper DLLs
- LSA authentication packages
- Security Support Providers
- Bootkit persistence
- UEFI persistence
- Shortcut modification (LNK)
- Office addins
9.3 Privilege Escalation¤
- Token manipulation
- Token impersonation
- UAC bypass techniques
- Kernel exploits
- Local privilege escalation exploits
- DLL hijacking
- Unquoted service paths
- AlwaysInstallElevated
- Weak service permissions
9.4 Defense Evasion¤
- AMSI bypass
- ETW patching
- Disabling Windows Defender
- Timestomping
- Log deletion
- Process masquerading
- DLL side-loading
- DLL search order hijacking
- Signed binary proxy execution
- Living-off-the-land binaries
- Fileless malware
- PowerShell obfuscation
- .NET obfuscation
9.5 Lateral Movement¤
- PsExec
- WMI
- WinRM
- DCOM
- RDP
- SMB exploitation
- Pass-the-Hash
- Pass-the-Ticket
- Overpass-the-Hash
- Golden Ticket
- Silver Ticket
9.6 C2 Communication¤
- HTTP/HTTPS C2
- DNS tunneling
- ICMP tunneling
- Social media C2 (Twitter, Telegram)
- Cloud storage C2 (Dropbox, Google Drive)
- Peer-to-peer C2
- Domain generation algorithms (DGA)
- Fast flux
- Dead drop resolvers
- Encrypted channels
- Covert channels
- Steganography
9.7 Data Exfiltration¤
- HTTP/HTTPS exfiltration
- DNS exfiltration
- Email exfiltration
- FTP/SFTP
- Cloud storage upload
- Steganography
- Compressed archives
- Encrypted archives
10. EXPLOIT ANALYSIS¤
10.1 Vulnerability Types¤
- Buffer overflows (Stack, Heap)
- Use-after-free
- Double-free
- Integer overflows
- Format string bugs
- Race conditions
- Logic bugs
- Type confusion
10.2 Exploit Techniques¤
- Return-to-libc
- ROP (Return-Oriented Programming)
- JOP (Jump-Oriented Programming)
- Heap spraying
- JIT spraying
- ASLR bypass
- DEP/NX bypass
- Stack canary bypass
- Control-flow integrity bypass
10.3 Exploit Frameworks in Malware¤
- Metasploit modules
- Exploit kits (Angler, RIG, Neutrino, Magnitude)
- Browser exploits
- Office exploits
- PDF exploits
- Java exploits
- Flash exploits
- Zero-day exploits
10.4 Shellcode Analysis¤
- Shellcode structure
- Shellcode encoding
- Polymorphic shellcode
- Alphanumeric shellcode
- Egg hunters
- Staged vs stageless
- Reverse shell
- Bind shell
- Meterpreter payloads
11. MOBILE MALWARE ANALYSIS¤
11.1 Android Malware Analysis¤
- APK structure (AndroidManifest.xml, classes.dex, resources)
- Static analysis tools (apktool, jadx, dex2jar, JD-GUI)
- Dynamic analysis (Android emulator, real device)
- ADB (Android Debug Bridge)
- Logcat
- Frida (dynamic instrumentation)
- Objection
- Xposed framework
- Drozer
- MobSF (Mobile Security Framework)
- Android malware techniques
- Obfuscation techniques
- Native code analysis (ARM)
- Root detection
- Emulator detection
- SSL pinning
11.2 iOS Malware Analysis¤
- IPA structure
- Jailbreak tools
- Static analysis (class-dump, Hopper, IDA Pro)
- Dynamic analysis (Frida, Cycript)
- SSL Kill Switch
- Objection
- iOS internals
- Objective-C/Swift reverse engineering
- Keychain analysis
12. THREAT INTELLIGENCE & IOC¤
12.1 Indicator of Compromise (IOC)¤
- File hashes (MD5, SHA-1, SHA-256)
- IP addresses
- Domain names
- URLs
- Email addresses
- Mutexes
- Registry keys
- File paths
- Network signatures
- YARA rules
- Suricata rules
- Snort rules
12.2 IOC Extraction¤
- Automated extraction
- Manual extraction
- Configuration extraction
- Network IOC từ PCAP
- Memory IOC từ dumps
- Static IOC từ binaries
12.3 Threat Intelligence Platforms¤
- MISP (Malware Information Sharing Platform)
- OpenCTI
- AlienVault OTX
- ThreatConnect
- VirusTotal Intelligence
- Hybrid Analysis
- Any.run
- MalwareBazaar
- URLhaus
- Abuse.ch feeds
12.4 Frameworks¤
- MITRE ATT&CK
- Cyber Kill Chain
- Diamond Model
- STIX/TAXII
- OpenIOC
12.5 Malware Families & Attribution¤
- Malware taxonomy
- Family identification
- Variant tracking
- Threat actor attribution
- APT tracking
- Campaign analysis
- TTPs (Tactics, Techniques, Procedures)
13. YARA RULES¤
13.1 YARA Basics¤
- YARA syntax
- String patterns
- Hex patterns
- Regular expressions
- Wildcards
- Conditions
- Meta information
- Rule structure
13.2 Advanced YARA¤
- PE module
- ELF module
- Math module
- Hash module
- Time module
- Cuckoo module
- Performance optimization
- Private rules
- Global rules
- Include statements
- External variables
13.3 YARA in Practice¤
- Malware hunting
- Incident response
- Sandbox integration
- Memory scanning
- Live system scanning
- Rule testing
- False positive reduction
- Rule sharing
- yarGen (rule generation)
- Valhalla (rule feed)
14. REPORTING & DOCUMENTATION¤
14.1 Analysis Report Structure¤
- Executive summary
- Malware overview
- Technical analysis
- Static analysis findings
- Dynamic analysis findings
- Network analysis
- Memory analysis
- IOCs
- MITRE ATT&CK mapping
- Remediation recommendations
- Appendices
14.2 Documentation Best Practices¤
- Clear and concise writing
- Technical accuracy
- Evidence preservation
- Screenshots và annotations
- Code snippets
- Network diagrams
- Timeline creation
- Chain of custody
- Reproducibility
14.3 Tools for Documentation¤
- Markdown
- Jupyter notebooks (for Python analysis)
- CherryTree
- OneNote
- Notion
- Obsidian
- LaTeX (for formal reports)
- Diagram tools (draw.io, Visio)
14.4 Sharing Intelligence¤
- Malware reports
- Blog posts
- Conference presentations
- Research papers
- Twitter threads
- GitHub repositories
- Malware samples (hashed)
- YARA rules
- IDA/Ghidra databases
15. SPECIALIZED TOPICS¤
15.1 Firmware Analysis¤
- Firmware extraction
- Firmware unpacking (binwalk, firmware-mod-kit)
- Filesystem analysis
- Binary analysis in firmware
- Embedded device malware
- Router malware
- IoT malware
- UEFI/BIOS malware
15.2 Fileless Malware¤
- PowerShell-based malware
- WMI-based malware
- Registry-only malware
- Memory-only malware
- Living-off-the-land techniques
- Detection challenges
- Analysis techniques
15.3 Ransomware Analysis¤
- Encryption algorithm identification
- Key generation analysis
- Ransom note analysis
- Payment tracking (Bitcoin analysis)
- Decryption possibilities
- Master key extraction
- Backup deletion techniques
- Volume Shadow Copy deletion
15.4 Banking Trojan Analysis¤
- Web injection techniques
- Man-in-the-browser attacks
- Form grabbing
- HTML injection
- Proxy configuration
- Certificate pinning bypass
- Configuration files
- Target lists
15.5 APT Malware Analysis¤
- Multi-stage payloads
- Custom protocols
- Stealthy persistence
- Anti-forensics
- Data staging
- Exfiltration techniques
- Living-off-the-land
- Zero-day exploitation
- Attribution challenges
15.6 macOS Malware Analysis¤
- Mach-O format
- Gatekeeper bypass
- SIP bypass
- TCC bypass
- Keychain access
- Objective-C runtime
- Swift analysis
- macOS internals
- Sandbox escapes
15.7 .NET Malware Analysis¤
- .NET architecture
- CIL (Common Intermediate Language)
- dnSpy
- ILSpy
- de4dot (deobfuscator)
- .NET Reactor unpacking
- ConfuserEx unpacking
- Obfuscation techniques
- Native compilation (NGen)
15.8 Document-based Malware¤
- Office malware (macros, DDE, OLE)
- PDF malware (JavaScript, embedded EXE)
- RTF exploits
- CHM files
- HTA files
- Macro analysis (olevba)
- VBA stomping
- Encrypted macros
- Template injection
16. AUTOMATION & TOOLING¤
16.1 Automated Analysis Platforms¤
- Cuckoo Sandbox setup và customization
- CAPE Sandbox
- Joe Sandbox
- Any.run
- Hybrid Analysis
- VirusTotal Intelligence
- Custom sandbox development
16.2 Analysis Automation¤
- Python scripting for automation
- IDA Pro scripting (IDAPython)
- Ghidra scripting
- r2pipe (Radare2)
- Binary analysis frameworks
- angr (symbolic execution)
- Triton
- Manticore
- KLEE
- Automated unpacking scripts
- IOC extraction automation
- Report generation automation
16.3 Custom Tool Development¤
- Binary parsers
- Unpacking tools
- Configuration extractors
- Decryption tools
- YARA rule generators
- Network protocol analyzers
- Memory scanners
- Emulators for specific malware
16.4 Integration¤
- SIEM integration
- Threat intelligence platform integration
- Ticketing system integration
- API development
- Webhook integration
17. ADVANCED TECHNIQUES¤
17.1 Symbolic Execution¤
- angr framework
- Constraint solving (Z3)
- Path exploration
- State management
- Binary analysis với angr
- Vulnerability discovery
17.2 Taint Analysis¤
- Dynamic taint analysis
- Static taint analysis
- Information flow tracking
- Input validation analysis
17.3 Emulation¤
- Unicorn engine
- QEMU
- Full system emulation
- CPU emulation
- Unpacking via emulation
- API emulation
17.4 Binary Diffing¤
- BinDiff
- Diaphora
- Patch analysis
- Variant analysis
- Code reuse detection
17.5 Machine Learning in Malware Analysis¤
- Feature extraction
- Classification models
- Clustering malware families
- Anomaly detection
- Automated analysis
- Deep learning for malware detection
- Adversarial ML attacks
18. INDUSTRY TOOLS & PLATFORMS¤
18.1 Commercial Tools¤
- IDA Pro
- Hex-Rays Decompiler
- Binary Ninja
- Hopper Disassembler
- JEB Decompiler (Android/Native)
- Relyze
- PE Explorer
- CFF Explorer
18.2 Free/Open Source Tools¤
- Ghidra
- Radare2/Rizin/Cutter
- x64dbg/x32dbg
- OllyDbg
- GDB
- Volatility
- YARA
- ClamAV
- REMnux distribution
- FLARE VM
- Santoku (mobile)
18.3 Online Services¤
- VirusTotal
- Hybrid Analysis
- Joe Sandbox
- Any.run
- MalwareBazaar
- URLhaus
- ThreatMiner
- AlienVault OTX
- Shodan
- Censys
19. LAB SETUP & ENVIRONMENT¤
19.1 Malware Analysis Lab¤
- Isolated network
- Virtual machines (VirtualBox, VMware, Hyper-V)
- Snapshots
- REMnux (Linux analysis)
- FLARE VM (Windows analysis)
- INetSim (service simulation)
- FakeNet-NG
- Malware sample storage
- Air-gapped analysis
- Physical isolation
19.2 Safe Handling¤
- Encrypted sample storage
- Password protection (standard: infected)
- Zip với password
- Secure transfer
- Legal considerations
- Ethics
- Sample sharing protocols
19.3 Infrastructure¤
- Analysis VMs
- Monitoring VMs
- C2 simulation infrastructure
- Network traffic capture
- Log collection
- Backup solutions
20. CERTIFICATIONS¤
20.1 Foundational¤
- CompTIA Security+
- CEH (Certified Ethical Hacker)
- GIAC GSEC (Security Essentials)
20.2 Malware Analysis Specific¤
- GREM (GIAC Reverse Engineering Malware) - HIGHLY RECOMMENDED
- GDAT (GIAC Defending Advanced Threats)
- eLearnSecurity eMAPT (Malware Analysis Professional)
- Practical Malware Analysis & Triage (PMAT) - TCM Security
20.3 Reverse Engineering¤
- GXPN (GIAC Exploit Researcher and Advanced Penetration Tester)
- Offensive Security OSED (Exploit Developer)
- Offensive Security OSWE (Web Expert)
- eLearnSecurity eCXD (Exploit Development)
20.4 Specialized¤
- GCFA (GIAC Certified Forensic Analyst)
- GNFA (GIAC Network Forensic Analyst)
- GCIA (GIAC Certified Intrusion Analyst)
- CCFE (Certified Computer Forensics Examiner)
- EnCE (EnCase Certified Examiner)
20.5 Vendor Certifications¤
- Microsoft Certified: Security Operations Analyst
- Cisco CyberOps Associate/Professional
- SANS certifications (FOR610, FOR710, SEC760)
21. RESOURCES & CONTINUOUS LEARNING¤
21.1 Books - ESSENTIAL READING¤
- "Practical Malware Analysis" by Michael Sikorski, Andrew Honig (Bible)
- "The Art of Memory Forensics" by Michael Hale Ligh et al.
- "Malware Analyst's Cookbook" by Michael Ligh et al.
- "Rootkits and Bootkits" by Alex Matrosov et al.
- "The IDA Pro Book" by Chris Eagle
- "Practical Binary Analysis" by Dennis Andriesse
- "Reversing: Secrets of Reverse Engineering" by Eldad Eilam
- "Learning Malware Analysis" by Monnappa K A
- "Windows Internals" by Mark Russinovich (Parts 1 & 2)
- "x86 Disassembly" by Wikibooks
- "Hacking: The Art of Exploitation" by Jon Erickson
- "Gray Hat C#" by Brandon Perry
- "Android Hacker's Handbook"
- "iOS Hacker's Handbook"
21.2 Online Courses¤
- SANS FOR610 (Reverse-Engineering Malware)
- SANS FOR710 (Reverse-Engineering Malware Advanced)
- SANS SEC760 (Advanced Exploit Development)
- Malware Analysis Bootcamp (Pluralsight)
- Malware Analysis and Reverse Engineering (Cybrary)
- Practical Malware Analysis & Triage (TCM Security)
- MalwareTech tutorials
- OpenSecurityTraining
21.3 Practice Platforms¤
- Malware samples:
- MalwareBazaar (https://bazaar.abuse.ch/)
- VirusShare
- theZoo (GitHub - caution!)
- Contagio
-
VX Underground (research only)
-
CTF platforms:
- FlareOn Challenge (FireEye/Mandiant)
- Reversing.kr
- Crackmes.one
- root-me.org
-
HackTheBox (reversing challenges)
-
Tutorials:
- MalwareTech blog
- hasherezade's blog
- OALabs (YouTube)
- 0xRick blog
21.4 Communities¤
- Malware analysis forums
- Reddit (r/Malware, r/ReverseEngineering)
- Discord servers (Malware Analysis, RE)
- Twitter infosec community (#malware, #RE)
- OALABS Discord
- MalwareMustDie
21.5 Blogs & News¤
- Malwarebytes Labs
- Kaspersky Securelist
- Bleeping Computer
- Krebs on Security
- TrendMicro Research
- Cisco Talos
- FireEye/Mandiant blog
- hasherezade's blog
- 0ffset's blog
- OALabs blog
21.6 Conferences¤
- DEF CON (Reverse Engineering Village)
- Black Hat (malware/RE talks)
- REcon (Reverse Engineering Conference)
- Virus Bulletin
- Botconf
- Malcon
- BSides events
- Hack in the Box
21.7 Tools Collections¤
- FLARE team tools (GitHub)
- REMnux toolkit
- SANS SIFT Workstation
- Hybrid Analysis community tools
- Awesome Malware Analysis (GitHub)
21.8 YouTube Channels¤
- OALabs
- MalwareAnalysisForHedgehogs
- LiveOverflow
- John Hammond
- IppSec
- 13Cubed
- Colin Hardy
22. CAREER PATH¤
22.1 Entry Level¤
- Malware Analyst (Junior)
- Sample triage
- Basic static/dynamic analysis
- IOC extraction
- Report writing
-
Salary: \(60k-\)80k
-
SOC Analyst with malware focus
- Alert triage
- Malware identification
- Basic analysis
- Salary: \(50k-\)70k
22.2 Mid Level¤
- Malware Analyst
- Advanced analysis
- Reverse engineering
- Custom tool development
- Threat intelligence
-
Salary: \(90k-\)120k
-
Reverse Engineer
- Binary analysis
- Vulnerability research
- Exploit analysis
- Salary: \(100k-\)130k
22.3 Senior Level¤
- Senior Malware Analyst
- Complex malware families
- APT analysis
- Team lead
- Training junior analysts
-
Salary: \(130k-\)160k
-
Principal Reverse Engineer
- Advanced RE projects
- Zero-day analysis
- Tool development
- Research
- Salary: \(140k-\)180k
22.4 Expert/Specialist¤
- Malware Researcher
- Original research
- Conference speaking
- CVE discoveries
- Advanced techniques
-
Salary: \(150k-\)200k+
-
Threat Intelligence Lead
- Team management
- Strategic analysis
- Threat actor tracking
- Salary: \(160k-\)200k+
22.5 Industry Sectors¤
- Antivirus companies (Kaspersky, Bitdefender, ESET, etc.)
- Security vendors (CrowdStrike, FireEye/Mandiant, Palo Alto)
- Government agencies (NSA, FBI, CISA)
- Defense contractors
- Financial institutions
- Big tech (Google, Microsoft, Apple)
- Consulting firms
- MSSPs
- Independent consulting/freelance
22.6 Related Roles¤
- Threat Hunter
- Incident Responder (DFIR)
- Exploit Developer
- Security Researcher
- Vulnerability Researcher
- APT Analyst
- Threat Intelligence Analyst
23. SOFT SKILLS¤
23.1 Analytical Skills¤
- Critical thinking
- Problem-solving
- Pattern recognition
- Attention to detail
- Logical reasoning
- Hypothesis testing
23.2 Communication¤
- Technical writing
- Report writing
- Presentation skills
- Teaching/mentoring
- Cross-team collaboration
- Stakeholder communication
23.3 Research Skills¤
- Literature review
- Experimentation
- Documentation
- Tool evaluation
- Staying current
- Continuous learning
23.4 Mindset¤
- Patience (analysis can take days/weeks)
- Curiosity
- Persistence
- Adaptability
- Attention to detail
- Systematic approach
- Creative thinking
LỘ TRÌNH HỌC ĐỀ XUẤT (24-36 THÁNG)¤
Tháng 1-3: Foundations¤
- Computer architecture
- OS internals (Windows/Linux)
- C/C++ programming
- Assembly basics (x86)
- Python scripting
Tháng 4-6: Reverse Engineering Basics¤
- IDA Pro/Ghidra basics
- x64dbg/GDB
- Static analysis techniques
- Dynamic analysis techniques
- PE format mastery
Tháng 7-9: Malware Analysis Fundamentals¤
- Basic static/dynamic analysis
- Sandboxing
- Behavioral analysis
- String analysis
- Packer identification
Tháng 10-12: Advanced RE & Analysis¤
- Advanced debugging
- Unpacking techniques
- Anti-analysis bypass
- Code obfuscation
- Memory forensics (Volatility)
Tháng 13-15: Specialized Malware¤
- Ransomware analysis
- Banking trojans
- RATs
- Rootkits
- Mobile malware (Android)
Tháng 16-18: Advanced Topics¤
- Exploit analysis
- Shellcode analysis
- Kernel malware
- APT malware
- Cryptography in malware
Tháng 19-21: Automation & Tooling¤
- Python automation
- IDA/Ghidra scripting
- Custom tool development
- Sandbox customization
- YARA mastery
Tháng 22-24: Threat Intelligence¤
- IOC extraction
- MITRE ATT&CK
- Threat intelligence platforms
- Report writing
- Attribution techniques
Tháng 25-30: Specialization¤
- Choose specialization (APT, ransomware, mobile, etc.)
- Advanced research
- Conference talks
- Blog writing
- Open source contributions
Tháng 31-36: Mastery¤
- Original research
- 0-day hunting
- Advanced tool development
- Mentoring others
- Industry recognition
TIPS ĐỂ MASTER MALWARE ANALYSIS¤
Daily Practice¤
- Analyze 1 malware sample mỗi ngày
- Document everything
- Write YARA rules
- Share findings
Build Portfolio¤
- GitHub repository với tools
- Blog write-ups (malware analysis)
- YARA rules repository
- Conference presentations
- CVE discoveries
Networking¤
- Twitter malware analysis community
- Discord servers
- Conference attendance
- Mentorship
- Collaborate on analysis
Stay Current¤
- Daily malware news
- Follow researchers
- New techniques
- Tool updates
- Threat actor campaigns
Contribute¤
- Open source tools
- YARA rules sharing
- Write-ups
- Help community
- Mentor beginners
Build Lab¤
- Proper isolation
- Multiple VMs
- Tool collection
- Sample repository
- Documentation system
Read Code¤
- Read malware source code (when available)
- Read analysis tool source
- Understand techniques
- Learn from others
Challenge Yourself¤
- FlareOn Challenge annual
- Analyze APT samples
- Reverse unfamiliar architectures
- Learn new techniques
- Research 0-days
KẾT LUẬN¤
Malware Analysis/Reverse Engineering là một trong những lĩnh vực KHÓ NHẤT nhưng cũng THÚ VỊ NHẤT trong cybersecurity.
Yêu cầu: - Kiên nhẫn cực cao (1 sample có thể mất hàng tuần) - Kỹ thuật sâu (assembly, OS internals, cryptography) - Continuous learning (malware luôn tiến hóa) - Passion thực sự (không phải vì tiền)
Phần thưởng: - Lương CỰC CAO (\(150k-\)250k+ cho senior) - Intellectually stimulating - High respect trong community - Job security (demand > supply) - Work on cutting-edge threats
Nếu bạn thích DEEP TECHNICAL, PUZZLE-SOLVING, và DETECTIVE WORK thì đây là con đường dành cho bạn! 🔍🦠