VMRay Video Demo
Enhance Detection Engineering via Deep Analysis of Qbot
This video will demonstrate how to analyze and detect the dangerous Qbot malware family using VMRay. We will start by uploading a Qbot file to VMRay, and then we will walk through the different stages of the analysis process. We will discuss the various artifacts generated during the analysis and show how to use these artifacts to identify and detect Qbot. In this video, we will cover the following:
Covered In This Demo Video:
Discover the power of dynamically extracted function call strings in detection engineering
Uncover various patterns, including user agent strings and extracted IP address
Learn how to uncover and incorporate multiple patterns into YARA rules
Explore the use of artifacts like process names and command lines to create SIGMA rules