{"id":3981,"date":"2015-10-30T22:49:19","date_gmt":"2015-10-30T14:49:19","guid":{"rendered":"https:\/\/www.darknet.org.uk\/?p=3981"},"modified":"2016-09-26T23:50:49","modified_gmt":"2016-09-26T15:50:49","slug":"damm-differential-analysis-of-malware-in-memory","status":"publish","type":"post","link":"https:\/\/www.darknet.org.uk\/2015\/10\/damm-differential-analysis-of-malware-in-memory\/","title":{"rendered":"DAMM – Differential Analysis of Malware in Memory"},"content":{"rendered":"

Differential Analysis of Malware in Memory (DAMM) is a tool built on top of Volatility Framework<\/a>. Its main objective is as a test bed for some newer techniques in memory analysis, including performance enhancements via persistent SQLite storage of plugin results (optional); comparing in-memory objects across multiple memory samples, for example processes running in an uninfected samples versus those in an infected sample; data reduction via smart filtering (e.g., on a pid across several plugins); and encoding a set of expert domain knowledge to sniff out indicators of malicious activity, like hidden processes and DLLs, or windows built-in processes running form the wrong directory.<\/p>\n

\"DAMM<\/p>\n

It is meant as a proving ground for interesting new techniques to be made available to the community. These techniques are an attempt to speed up the investigation process through data reduction and codifying some expert knowledge.<\/p>\n

Features<\/h3>\n