How to triage a suspicious file in a sandboxed environment
متى تستخدمه: You received a suspicious file and need a quick assessment before deep analysis.
المتطلبات الأساسية
- Claude with malware analysis skills installed — Upload SKILL.md orchestrator and sub-skill folders to Claude
- Isolated analysis environment — Use REMnux or FlareVM in a VM with no network access
الخطوات
-
Initial triageI have a suspicious PE file at /samples/malware.exe. Perform initial triage: file type, hashes, imports, strings analysis, and threat classification.✓ تم النسخ→ File metadata, hash values, suspicious imports/strings, threat assessment
-
Dynamic analysisSet up a dynamic analysis environment and execute the sample. Monitor for file system changes, network connections, registry modifications, and process creation.✓ تم النسخ→ Behavioral report with IOCs
النتيجة: A threat classification with IOCs and behavioral summary.
المزالق
- Running malware outside a sandbox — ALWAYS use an isolated VM with no network access. Never analyze malware on your host machine.