Static Analysis Flow

Step 1: Identify the file type -Target OS, architecture, and PE format (dll, exe)

Step 2: Generate a hash of the malware and see if it’s been identified

Step 3: Use the strings to get an idea of what the malware is capable of

Step 4: Packing and obfuscation - unpack and de-obfuscate to reveal additional information

Step 5: Analyze the PE headers