3. Summary

In this chapter, we learned some basics of how to analyze a Windows executable. We covered the different kinds of events you can look for in the logs of malware analysis tools. Going forward, we will introduce more tricks for malware analysis wherever needed.

In the next chapter, we will introduce ransomware's history and evolution - from when it started, and varieties. We will also cover the types of ransomware based on what they do.

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
3.145.186.6