Analysis of Black Energy Malware-Infected RAM Image with Volatility3
文章描述了使用Volatility工具分析Black Energy恶意软件内存镜像的过程,提取了系统信息和进程列表,并发现两个终止的进程。 2025-8-22 07:37:5 Author: infosecwriteups.com(查看原文) 阅读量:13 收藏

Erdem Ulu

Hello, today we analyze Black Energy malware. You can read here about Black Energy. You can download the lab file here. The file is a memory image of a windows system. Let’s move on. Strike while the iron is hot.

Password of the zip file : cyberdefenders.org

I unzipped the file using the command below.

7z x 99-BlackEnergy.zip

I use volatility for this. You can download volatility3 here. First we can look at windows.info outputs using the command below.

./vol.py -f CYBERDEF-567078-20230213-171333.raw windows.info

Press enter or click to view image in full size

We can see some information about the image.

After this we will look at windows.pslist plugin that lists all of processes on the RAM image. The command is below:

./vol.py -f CYBERDEF-567078-20230213-171333.raw windows.pslist

Press enter or click to view image in full size

There are two files marked rootkit.exe and cmd.exe but they are terminated processes because of the number of Threads. If a process’ number of Threads is 0 there is no work. So we can pass these processes. We didn’t see anything…


文章来源: https://infosecwriteups.com/analysis-of-black-energy-malware-infected-ram-image-with-volatility3-31379f8c4312?source=rss----7b722bfd1b8d---4
如有侵权请联系:admin#unsafe.sh