Personal Research & Skill Development
Malware Analysis Lab
Built an isolated malware research environment as a repeatable analysis workflow, not a one-off sandbox. Each sample moved through intake, static triage, dynamic tracing, and reporting so findings could be compared across families.
System Architecture
Structured as a segmented virtual network with isolated Windows and Linux VMs. Host-level instrumentation includes Sysmon, x64dbg/IDA, and Wireshark, with snapshot-based recovery to ensure environment integrity. Internal logging is routed to an offline manager for artifact collection.
Implementation Strategy
Implementation required hardening VM environments against sandbox detection, configuring internal network proxies to safely route malicious traffic, and building decoders for specialized C2 protocols.
Technical Outcome
Established a repeatable analysis pipeline for documenting malware behavior and generating high-fidelity detection artifacts.
Key Features
Continue Exploration