Academy

Module 5 Β· Malware Triage πŸ”’

Manish Garg
Manish Garg Associate CISSP Β· RingSafe
April 22, 2026
9 min read

When an alert fires and the SOC ends up holding a suspicious binary β€” extracted from a phishing attachment, pulled off an infected endpoint, or flagged by EDR β€” somebody has to decide quickly: is this actually malicious, what does it do, and how bad is the exposure? That is malware triage. Not full reverse engineering (that takes days per sample) but a fast, structured assessment that answers the operational questions in under 30 minutes. This module walks through static triage, behavioural triage in a sandbox, the tools that matter, and the decision points that mark when to escalate to a dedicated reverse engineer.

Triage vs reverse engineering

Reverse engineering is a deep discipline: disassembly, control-flow graphs, identifying crypto constants, recovering C2 protocol. It is expensive and slow. Triage is the fast first-pass that determines whether reverse engineering is worth doing, and extracts actionable indicators (IPs, domains, hashes, filenames, registry keys) so the SOC can hunt for other affected hosts while the RE work proceeds.

Triage answers: “Is it malicious? What family? What does it do at a high level? What indicators do we hunt on right now?”

Safety first β€” the workspace

Never open a sample on your workstation. Never. The setup:

  • Isolated VM β€” Flare-VM or REMnux image, snapshotted clean. Revert after each sample
  • Host-only networking or NAT’d to an internet-simulated environment (INetSim, FakeNet). Never your production network
  • No sensitive data on the analysis host β€” no corporate credentials, no VPN profiles, no browser sessions
  • Separate email for vendor sandbox submissions β€” VirusTotal, Hybrid Analysis, Joe Sandbox
  • Password-protected ZIPs when storing or sharing samples (convention: password is infected)

Before any hands-on work, acknowledge that the sample may exhibit anti-analysis behaviour: sandbox detection, timestamp checks, VM-fingerprinting. A tidy-looking benign result can be a decoy.

Phase 1 β€” Hash and lookup

First and cheapest step:

# Hash it
sha256sum sample.exe
md5sum sample.exe

# Look up on VirusTotal (hash-only, does not upload)
# API: GET https://www.virustotal.com/api/v3/files/{sha256}

A VirusTotal hit with 20+ engine detections and a recent first-seen date ends triage immediately: it is known malicious, pull the family name, extract IOCs, hunt. If no hit β€” continue.

Do not upload samples to public sandboxes by default. Uploads go into vendor corpora and are visible to threat actors who monitor them. Many APTs specifically watch VirusTotal for their own implants to detect that a victim is investigating. Use hash-only lookups until you have decided the sample is not targeted, or use a private sandbox tier.

Phase 2 β€” Static triage

Static analysis looks at the file without running it. Fast, safe, and often decisive.

πŸ” Intermediate Module Β· Basic Tier

Continue reading with Basic tier (β‚Ή499/month)

You've read 30% of this module. Unlock the remaining deep-dive, quiz, and every other Intermediate module.

99+ modulesAll levels up to this tier
20-question quizzesUnlimited retries with explanations
Completion certificatesShareable on LinkedIn
18 more sections locked below