When information in your system is compromised by malicious software, understanding the scope of the problem is an essential part of your incident response.
TruShield’s Malware Reverse Engineering uncovers the intruding software’s functionality and capabilities. Our skilled engineers begin by isolating the suspected malware in a controlled, virtual laboratory which closely mimics the configuration of your organization’s environment.
The malicious specimen undergoes a variety of proprietary behavior analysis procedures. The engineer monitors outgoing communication attempts and environmental changes made by the malware. Code analysis is performed on the malware through the use of disassembler and debugger programs. The end result is to determine how the malware operates, take precautions to prevent further contamination, and employ techniques to safely remove the malware.