Implementation method

Step 1
Static analysis: Use specialized tools to analyze code, debug malware samples.
Step 2
Dynamic analysis (behavior analysis): Execute malicious files in a safe simulation environment (sandbox) to identify the behaviors generated by malware.


The result report includes the following:
Overview of objectives, scope of implementation.
Summary of approach, implementation methodology.
A list of detected security issues, the severity of which related to malware.
Plan to remedy or minimize damage to the infected systems.