Skip main navigation

Welcome to week two

Welcome to week two of the Introduction to Malware Investigations course intoduced by the course instructor, Steve Shepherd MBE

Welcome to week one

Welcome to week one of the Introduction to Malware Investigations course intoduced by the course instructor, Steve Shepherd MBE

File dates and times

File dates and times Dates and times can be altered to blend malware into its surroundings. Malware may change its dates and times so that it will appear consistent with …

ExpertTrack Courses

ExpertTrack Courses Welcome to this ExpertTrack course. This course forms part of the ExpertTrack series of courses. Over the next number courses, you’ll explore core activities and have the opportunity …

File size

File size A file actually has two different sizes. The first relates to the size of the file itself, referred to as the logical size, i.e., how big the file …

Welcome to week three

Welcome to week three of the Introduction to Malware Investigations course intoduced by the course instructor, Steve Shepherd MBE

Attribute 0x40 $OBJECT_ID

Attribute 0x40 $OBJECT_ID The purpose of the Object Id attribute is to identify individual files on a network. This attribute is known as a resident attribute meaning that all the …

File name

File name The name of a file is stored as metadata within the file system the file is saved to. Occasionally the name of a file can also be identified …

Instructor Bio

Course Instructor Bio Welcome to the course. My name is Steve Shepherd MBE and I will be your course instructor. I am a passionate about cyber security and related matters …

Attribute 0x30 $FILE_NAME

Attribute 0x30 $FILE_NAME The File Name attribute contains the actual file name itself together with the logical size (true size of file) and physical size (size of the file on …

Obfuscation methods

Obfuscation Google dictionary says: Malware does not want to be seen. It will hide on your computer and for the most, attempt to blend into your system. The malware may …