Malware Samples - PMA Chapter 3

17 Dec 2025

The second chapter of Practical Malware Analysis covers virtual machine setup in preparation for this chapter and had no labs. The third chapter covers the basics of dynamic analysis and how to inspect processes, registry entries, and network traffic associated with a sample. Before running any malware for dynamic analysis, I will take a snapshot of the VM state. Even if everything appears normal when analysis is complete, I will restore to that state because there is always the chance that something was missed.

This chapter required a lot of additional setup. First, I had to set up INetSim on my Ubuntu VM to simulate services on common ports, then set up this VM and the Windows XP VM to share a virtualized internal network and assign static IP addresses. Then I set up ApateDNS to re-direct all requests to the Ubuntu VM. Now INetSim will spoof a variety of network services (pop3, http/https, dns, ftp, etc.):

Samples:

  1. Malware Sample 1
  2. Malware Sample 2
  3. Malware Sample 3
  4. Malware Sample 4

Questions:

  1. What are this malware's imports and strings?
  2. What are the malware's host-based indicators?
  3. Are there any useful network-based signatures for this malware?

Feedback is welcome and encouraged! Please leave a comment below: