Mastering Reverse Engineering
上QQ阅读APP看书,第一时间看更新

Malware handling

Readers of this book are required to take precautions when handling malware files. Here are some initial tips that can help us to prevent our host machine from being compromised:

  • Do your analysis in an enclosed environment such as a separate computer or in a virtual machine.
  • If network access is not required, cut it off.
  • If internet access is not required, cut it off.
  • When copying files manually, rename the file to a filename that doesn't execute. For example, rename myfile.exe to myfile.foranalysis.