How to triage a suspicious file in a sandboxed environment
Wann einsetzen: You received a suspicious file and need a quick assessment before deep analysis.
Voraussetzungen
- Claude with malware analysis skills installed — Upload SKILL.md orchestrator and sub-skill folders to Claude
- Isolated analysis environment — Use REMnux or FlareVM in a VM with no network access
Ablauf
-
Initial triageI have a suspicious PE file at /samples/malware.exe. Perform initial triage: file type, hashes, imports, strings analysis, and threat classification.✓ Kopiert→ File metadata, hash values, suspicious imports/strings, threat assessment
-
Dynamic analysisSet up a dynamic analysis environment and execute the sample. Monitor for file system changes, network connections, registry modifications, and process creation.✓ Kopiert→ Behavioral report with IOCs
Ergebnis: A threat classification with IOCs and behavioral summary.
Fallstricke
- Running malware outside a sandbox — ALWAYS use an isolated VM with no network access. Never analyze malware on your host machine.