This repository contains my analysis of various malware samples uploaded to Malware Bazaar.
SHA256 | Analysis | File Type | Yara Rule |
---|---|---|---|
6fff03a5b2e69d3e0fc91be6d24a3dbbd37e490214122fa2a1ea6e80acfa2131 | YES | MS Excel (xlsx) | YES |
05aa485c6efbef1c65e5876428d00cbb72b85b0c16530ec9f0ed47355f8189d6 | YES | MS Excel (xlsx) | YES |
7c805f51ee3b2994e742d73954e51d7c2c24c76455b0b9a1b44d61cb4e280502 | YES | MS PowerPoint(ppt) | NO |
7974612d55958423ed64268bc4df602c9cd67fff5c248a3d14dac06ed6b03f04 | YES | PowerShell (ps1) | NO |
The purpose of the Maturity Matrix of the malware based off of the following factors Obfuscation, Attack Techinques & Functions/API used to calculate the associated risk. The matrix ranks a malware between 3
& 9
where 3
is the lowest risk & 9
the highest risk.