How to triage a suspicious file in a sandboxed environment
Когда использовать: You received a suspicious file and need a quick assessment before deep analysis.
Предварительные требования
- Claude with malware analysis skills installed — Upload SKILL.md orchestrator and sub-skill folders to Claude
- Isolated analysis environment — Use REMnux or FlareVM in a VM with no network access
Поток
-
Initial triageI have a suspicious PE file at /samples/malware.exe. Perform initial triage: file type, hashes, imports, strings analysis, and threat classification.✓ Скопировано→ File metadata, hash values, suspicious imports/strings, threat assessment
-
Dynamic analysisSet up a dynamic analysis environment and execute the sample. Monitor for file system changes, network connections, registry modifications, and process creation.✓ Скопировано→ Behavioral report with IOCs
Итог: A threat classification with IOCs and behavioral summary.
Подводные камни
- Running malware outside a sandbox — ALWAYS use an isolated VM with no network access. Never analyze malware on your host machine.