Files
docker_file_analysis/data/exam-cheatsheets/05-book-index.md
T
tobias 6349c3aa8e Add malware patterns cheat sheet and book index
04-malware-patterns.md: API→technique mapping, packer recognition,
anti-analysis assembly patterns, shellcode indicators, document
malware indicators, quick-reference lookup tables.

05-book-index.md: A-Z index of every tool, concept, API, technique,
and malware sample in the FOR610 course with book line numbers and
workbook lab references for quick lookup.

Co-Authored-By: Claude Opus 4.6 (1M context) <noreply@anthropic.com>
2026-03-31 08:41:30 +02:00

11 KiB
Raw Blame History

FOR610 Course Book & Workbook Index

Line numbers refer to book_clean.md. "L" prefix = Lab number in workbook.

Section Map

Section Topic Book Lines Labs
S1 Malware Analysis Fundamentals 432400 L1.1L1.8
S2 Reversing Malicious Code 24525100 L2.1L2.8
S3 Beyond Traditional Executables 51927800 L3.1L3.12
S4 In-Depth Malware Analysis 786610100 L4.1L4.9
S5 Examining Self-Defending Malware 1045313300 L5.1L5.10

A

Topic Book Lab
accept-all-ips (httpd) 1269 L1.3
AMSI monitoring 6704 L3.6
AMSIScriptContentRetrieval 6704 L3.6
Android analysis
Anti-debugging 1048510674 L5.1, L5.6
Anti-sandbox 11657 L5.5
Anti-VM detection 10740 L5.6
Any.run (sandbox) 239
API hashing 6286
API Monitor 18441860
ASLR / DynamicBase 81518190 L4.2
Assembly.Load (.NET) 9677, 10047 L4.8
AutoOpen (VBA trigger) 5771 L3.3

B

Topic Book Lab
base64dump.py 59886035 L3.4, L4.5
Beaconing 304, 12981313 L1.3, L1.6
bbcrack 1081310815 L5.2
Behavioral analysis 72, 8961380 L1.2, L1.6
Binary Ninja 1429
BlockInput API 1184211878 L5.6
box-js 6687
brbbot.exe (sample) 39, 6621823 L1.1L1.6, L4.1L4.4
brxor.py 1079910801 L5.2

C

Topic Book Lab
C2 communication 304, 32333353 L1.3, L1.5, L1.6
Calling conventions 34773725 L2.3, L2.4
capa 15581589 L1.4, L5.4
cdecl convention 36713714 L2.3
CFF Explorer 81748190
chatroom.exe (sample) 95979797 L4.8
checkbox.doc (sample) 58836135 L3.4
CheckRemoteDebuggerPresent 10669
CMP instruction 3153 L2.5, L2.6
Cobalt Strike beacon 60606077 L3.4
Code analysis 1390, 2452+ L2.1L2.8
Code injection 1007410387 L4.9, L5.4
Compound expressions 44744620 L2.6
Conditional jumps (Jcc) 31533167 L2.1, L2.5
Control flow 31373204 L2.5, L2.6
CreateFileA/W 15211527 L1.5
CreateProcess 38914028 L2.7, L5.4
CreateRemoteThread 1009810105 L4.9
CreateToolhelp32Snapshot 1011610123 L4.9, L5.6
CryptDecrypt 17761860 L1.5
CSharpCodeProvider 7462, 7625 L3.12
Cutter 1428
CyberChef 1897, 74077625 L1.5, L3.8, L3.12

D

Topic Book Lab
de4dot 1000210004 L4.8
Decompilation 73, 2643 L2.1
Detect It Easy (diec) 860865 L4.1
Disassembly 73, 2643 L2.1
DLL injection 71057172 L3.10
DLL side-loading 71057172 L3.10
dnSpyEx 96129797 L4.8
Document_Open (VBA) 5771 L3.3
Dropper pattern 47654835 L2.7
drtg.exe (sample) 1116111227 L5.3

E

Topic Book Lab
Emulation 14501589 L1.4
Entropy 80358050 L4.1
EBP register 3874, 3990 L2.3
EIP register 62706275
ESP register 3714, 3740 L2.3
ExeInfo PE 863 L3.12

F

Topic Book Lab
fakedns 11861195 L1.3, L1.7, L1.8
fastcall convention 36923699
fgg.js (sample) 6668 L3.7
Fiddler 22392245, 7042 L3.2, L3.8L3.12
FindResource 47664791 L2.7
FindWindow API 11730 L5.6
FLOSS 1091410919 L5.2, L5.3
FS:[0] (SEH chain) 1224012307 L5.7
FS:[30h] (PEB) 10556 L5.1, L5.9
Function epilogue 3874, 3990 L2.3
Function prologue 38393860 L2.3

G

Topic Book Lab
GetEIP technique 62706275
getdown.exe (sample) 2322, 1050110674 L1.8, L5.1, L5.2
GetModuleHandle 11730, 11946 L5.6
GetProcAddress 62866306 L5.4, L5.6
GetTickCount 1070810715
Ghidra 73, 1418, 26432705 L2.1L2.8, L4.9, L5.2, L5.4, L5.5
ghyte.exe (sample) 11742210 L1.7
great.exe (sample) 1013410387 L4.9

H

Topic Book Lab
Hook injection (SetWindowsHookEx) 1167111730 L5.5
httpd (web server) 12691279 L1.3, L1.6, L1.8
HTTP C2 pattern 32333353 L1.3, L2.2
HttpSendRequest 33383353 L2.2
Hybrid Analysis 239
hubert.dll (sample) 10799 L5.2

I

Topic Book Lab
IAT (Import Address Table) 836, 79377942, 8221 L4.2, L4.3
IDA 1426
ILSpy / ilspycmd 74757480, 9677 L3.12, L4.8
INetSim 21582172 L1.7
InternetOpen / InternetConnect 32473296 L2.2
InternetReadFile 1589, 3250, 6051 L1.4, L2.2
iptables 23222359 L1.8
IsDebuggerPresent 1055610674 L5.1, L5.9
iviewers.dll (sample) 70077172 L3.10

JK

Topic Book Lab
JavaScript deobfuscation 64076700 L3.6, L3.7
JE/JZ, JNE/JNZ (jumps) 31533167 L2.1, L2.5
jq (JSON processing) 1562 L1.4

L

Topic Book Lab
lansrv.exe (sample) 11260 L5.9
LEA instruction 4910 L2.8
LoadLibrary 62866288, 7153 L3.10, L5.10
Local variables 36133643 L2.3
Loops (assembly) 43094488 L2.5
loveyou.js (sample) 64966533 L3.6

M

Topic Book Lab
Multi-stage malware 60766080, 7042 L3.8L3.12
mydoc.docm (sample) 57555771 L3.3

N

Topic Book Lab
.NET analysis 74757793, 95979797 L3.12, L4.8
.NET reflective loading 9677, 10047 L4.8
NOP sled 6220 L3.5
NtGlobalFlag check 10656
NtQueryInformationProcess 1116311227 L5.3
NtUnmapViewOfSection 1141111558 L5.4
numbers-to-string.py 5788 L3.3

O

Topic Book Lab
objects.js (SpiderMonkey) 6496 L3.6, L3.7
OEP (Original Entry Point) 8226 L4.3, L5.8, L5.10
oledump.py 57555771 L3.3, L3.4, L4.5
OllyDumpEx 8277 L4.3, L5.4, L5.8
OpenProcess 1022010241 L4.9
OutputDebugString 10673

P

Topic Book Lab
Package.exe (sample) 70077172 L3.10
Packed binaries 79378050 L4.1
Parameters (function) 36713725 L2.3, L2.4
PDF analysis 52805500 L3.1
pdf-parser.py 53105500 L3.1
pdfid.py 53105336 L3.1
PDFXCview.exe (sample) 78668044 L4.5L4.7
PE file format 861, 7939 L1.1, L4.1
pe_unmapper 1344013444 L5.10
PEB (Process Environment Block) 10556, FS:[30h] L5.1, L5.9
peframe 846850 L1.1, L4.8
Persistence 800, 1065, 2720, 5047 L1.2, L2.8
PeStudio 816837 L1.1, L4.1, many others
pestr 779788 L1.1, L4.8
PowerShell encoded commands 5988, 6997 L3.4, L3.9, L3.11
PowerShell ISE 69977033 L3.9, L3.11, L4.5
Process hollowing 1139811558 L5.4
Process Monitor 911, 9541084 L1.2, L4.5
Process32First/Next 1034610386 L4.9, L5.6
ProcDOT 911, 11101150 L1.2, L4.5
PUSHAD / POPAD 8140 L4.3

Q

Topic Book Lab
qa.doc (sample) 61486371 L3.5
QueryPerformanceCounter 10715

R

Topic Book Lab
raas.exe (sample) 10676 L5.6
radare2 1428
RDTSC timing check 1071010716
ReadFile 15211787 L1.5
Reflective loading (.NET) 9677, 10047 L4.8
Registers (32-bit) 28372845 L2.1
Registers (64-bit) 49004936 L2.8
Registry Run keys 786, 1065, 2720 L1.2, L2.1
RegOpenKeyEx 27502768 L2.1
Regshot 912, 9691068 L1.2
REP MOVSB
Resource extraction 47664791 L2.7
Return values (EAX/RAX) 2838, 3860 L2.3
roomsvisitor.saz (sample) 7042 L3.8
rtfdump.py 61486222 L3.5
runsc / runsc32 63066337 L3.5, L4.6
rwvg1.exe (sample) 74077793 L3.12

S

Topic Book Lab
Scylla 82438277 L4.2, L4.3, L5.8, L5.10
ScyllaHide 1072710736 L5.3, L5.6
scdbgc / scdbg 60466052 L3.4, L3.5, L4.6
SEH (Structured Exception Handling) 1224012307 L5.7, L5.8
setdllcharacteristics 81778190 L4.2
SetWindowsHookExA 1167111730 L5.5
Shellcode 60466371 L3.4, L3.5, L4.6, L4.7
ShellExecute 5014, 6533 L2.8
Sleep API
SpiderMonkey 64886668 L3.6, L3.7, L4.5
speakeasy 14691527 L1.4
Stack frame 36133643 L2.3
Stack strings 10898, 16342 L5.2
Static analysis 165, 616880 L1.1
stdcall convention 36753682 L2.3
steel1.pdf (sample) 53105500 L3.1
strdeob.pl 1089810900 L5.2
strings (tool) 782787 L1.1, L3.4, L5.2
String obfuscation 10485, 10799 L5.2
svchost.exe (sample) 27502783 L2.1L2.8
System Informer 911, 1025 L1.2, L1.6L1.8, L4.2, L5.1

T

Topic Book Lab
TEST instruction 1780 L2.1, L5.1
thiscall convention 36953700
TLS callbacks 11260 L5.9
Tool detection (malware) 10727, 11946 L5.6
translate.py 6035 L3.4
trid L3.3, L3.4

U

Topic Book Lab
Unpacking 80908312, 7937 L4.1L4.4, L5.3, L5.8, L5.10
UPX 79628140 L4.1, L4.2

V

Topic Book Lab
vbprop.exe (sample) 11657 L5.5
VirtualAlloc 60156018 L4.7
VirtualAllocEx 1030310311 L4.9, L5.4
VirtualProtect 13264 L5.10
VirusTotal 236264

W

Topic Book Lab
want.exe (sample) 1219112247 L5.7, L5.8
WH_MOUSE_LL (hook) 11671 L5.5
WinDbg 1427
WinHost32.exe (sample) 1127011557 L5.4
Wireshark 910, 9871030 L1.2, L1.3, L1.6L1.8, L5.1
WriteFile 1521, 4791 L1.5, L2.7
WriteProcessMemory 11398 L5.4

X

Topic Book Lab
x64 calling convention 49005103 L2.8
x64dbg / x32dbg 16131706 L1.5, L4.3L4.4, L5.1L5.10
XOR encoding / loop 6035, 10799 L3.4, L5.2, L5.9
XORSearch 62526260 L3.5, L5.2

Y

Topic Book Lab
YARA / yara-rules 60606063 L3.4
yep.exe (sample) 13264 L5.10

Z

Topic Book Lab
ZwUnmapViewOfSection 11427, 11554 L5.4