>_ Malware Analysis Lab

PRACIVO LAB — SAFE SAMPLES ONLY
⚠️ Pracivo Security Lab — All samples are COMPLETELY SAFE text files. No real malware. For learning static analysis techniques only.

> Strings Analysis

# Extract printable strings from a binary:
strings malware.exe

# Extract with minimum length of 6 chars:
strings -n 6 malware.exe

# What to look for:
# - URLs and IP addresses (C2 servers)
# - File paths (persistence locations)
# - Registry keys (startup entries)
# - Windows API function names (behavior clues)
# - Error messages (reveals functionality)
# - Encoded strings (Base64, hex)

# Advanced: FLOSS also extracts obfuscated strings:
floss malware.exe

# Look for these red flags:
# - cmd.exe, powershell.exe (command execution)
# - CryptEncrypt, CryptGenKey (encryption)
# - URLDownloadToFile (downloading payloads)
# - CreateRemoteThread (process injection)
# - GetAsyncKeyState (keylogging)
# - DeleteShadowCopies (ransomware prep)

# Practice: download the sample files and run strings on them