Introduction
Most incidents nowadays involve a security breach typically include malware, which might be designed to allow the attacker to remotely control the compromised system, spread within the organization, steal sensitive documents, spy on the victim, and so on. In this blog, we will briefly discuss the key aspects of the malware analysis and reverse engineering investigation process from an incident response point of view, and walks you through an example of using publicly available tools and data sources to start learning about the nature of a suspicious file.