Malware Hunting Videos

The following videos should help you understand how to hunt for malware using LOG-MD.

 
 
Hunting so called "Fileless malware" or "Non-Malware malware" using LOG-MD Professional. See Interesting Artifacts, AutoRuns, Large Registry Keys, and SRUM in action

Malware Sample - 2017-07-14

Watch as we use LOG-MD Professional ver 1.2 to hunt so called "Fileless Malware" or "Non-Malware malware" using LOG-MD Professional (Kovter)

 
Hunting so called "Fileless malware" or "Non-Malware malware" using LOG-MD Free Edition

Malware Sample - 2017-07-11

Watch as we use LOG-MD Free Edition ver 1.2 to hunt so called "Fileless Malware" or "Non-Malware malware" using LOG-MD Free Edition

 
Using LOG-MD to collect AutoRuns to find malware persistence.

Malware Sample - 2017-04-19

Watch as we use LOG-MD Free and Professional's new AutoRun feature to discover the persistence method and location of the malware that infected the system in less than 4 minutes!

 
This video without audio is a typical malware lab evaluation of a sample received by email. The system was infected and then usign LOG-MD Professional, discovered the malware artifacts. 5 minutes

Malware Sample - 2017-04-13

This is a typical malware people receive via email.  The email contained a URL in the body of the message that has the user downloading a file.  If the user double-clicks the .js file, the system is infected.  With this sample, the malware throws up errors making the user, and possibly the analyst believe it failed to run or infect.  Watch as we infect the system and run LOG-MD Professional to discover the malicious artifacts in 5 minutes!

 
This shows how to hunt malicious AutoRuns using LOG-MD-Professional

FindING a Malicious AUTORUN DLL USING LOG-MD-Pro

This is a typical malware sample that uses a DLL to load via a AutoRun Key.  Watch as we run LOG-MD Professional to discover the malicious AutoRun in 5 minutes!