Malware Infection¶
Your systems are infected with malicious software - this could be a virus, trojan, spyware, rootkit, or other malware. The key is to contain the infection, preserve evidence, and then clean or rebuild affected systems.
Types of Malware¶
- Virus - Self-replicating, spreads to other files
- Trojan - Disguised as legitimate software
- Spyware - Collects information without consent
- Rootkit - Hides deep in the system, hard to detect
- Worm - Self-replicating across networks
- Keylogger - Records keystrokes
- RAT (Remote Access Trojan) - Gives attacker remote control
Immediate Actions¶
- Isolate the system - Disconnect from network (unplug cable, disable WiFi)
- Do NOT turn off the computer - Evidence in memory may be lost
- Document symptoms - What made you suspect infection? Screenshots?
- Identify scope - How many systems might be affected?
- Preserve evidence - Before cleaning, consider forensic imaging
Online Malware Analysis Tools¶
VirusTotal¶
- Website: virustotal.com
- Upload suspicious files for scanning by 70+ antivirus engines
- Also analyzes URLs, domains, and IP addresses
- Free to use
Hybrid Analysis¶
- Website: hybrid-analysis.com
- Free malware analysis service
- Detailed behavioral reports
- Shows what the malware does when executed
Any.Run¶
- Website: any.run
- Interactive malware sandbox
- Watch malware execute in real-time
- Free tier available
Joe Sandbox¶
- Website: joesandbox.com
- Deep malware analysis
- Free community edition
MalwareBazaar¶
- Website: bazaar.abuse.ch
- Malware sample database
- Check if your sample is known
Antivirus & Removal Tools¶
Free Scanning Tools¶
- Malwarebytes: malwarebytes.com - Free scanner, effective against many threats
- ESET Online Scanner: eset.com/us/home/online-scanner - Scan without installing
- Kaspersky Virus Removal Tool: kaspersky.com/downloads/free-virus-removal-tool
- Microsoft Safety Scanner: microsoft.com/security/scanner
Bootable Rescue Disks¶
For severe infections, boot from clean media: - Kaspersky Rescue Disk: support.kaspersky.com/krd18 - ESET SysRescue: eset.com/int/support/sysrescue - Bitdefender Rescue CD: bitdefender.com/support/how-to-create-a-bitdefender-rescue-cd-627.html
Evidence Collection Tools¶
Memory Capture (Before Shutdown)¶
- WinPmem: github.com/Velocidex/WinPmem - Windows memory acquisition
- FTK Imager: exterro.com/ftk-imager - Memory and disk imaging
- Volatility: volatilityfoundation.org - Memory analysis framework
Triage Collection¶
- KAPE: kroll.com/kape - Fast artifact collection
- Velociraptor: github.com/Velocidex/velociraptor - Remote forensic collection
Threat Intelligence¶
Check Indicators of Compromise (IOCs)¶
IP/Domain Reputation: - AbuseIPDB: abuseipdb.com - Check malicious IP addresses - URLhaus: urlhaus.abuse.ch - Malicious URL database - ThreatFox: threatfox.abuse.ch - IOC database
Hash Lookup: - VirusTotal: virustotal.com - File hash lookup - MalwareBazaar: bazaar.abuse.ch - Known malware hashes
Swedish Resources¶
CERT-SE¶
- Report: cert.se
- 24/7 hotline: +46 10 240 40 40
- May have intelligence on the malware family
Guides & Documentation¶
SANS Malware Analysis¶
- Cheat sheets: sans.org/posters
- Malware analysis quick reference
CISA Malware Analysis Reports (MARs)¶
- Website: cisa.gov/news-events/analysis-reports
- Detailed analysis of specific malware families
Security in a Box - Malware¶
- Guide: securityinabox.org/en/phones-and-computers/malware
- Prevention and detection guidance
Recovery Decision¶
Option 1: Clean and Monitor¶
- Run multiple antivirus scans
- Remove detected malware
- Monitor for reinfection
- Risk: May not remove all components
Option 2: Wipe and Rebuild (Recommended for Serious Infections)¶
- Image the disk for evidence
- Wipe and reinstall operating system
- Restore data from clean backups
- Safest: Ensures complete removal
Evidence to Preserve¶
- [ ] Memory dump (before shutdown if possible)
- [ ] Suspicious files (quarantine, don't delete)
- [ ] System logs
- [ ] Network logs showing C2 communication
- [ ] Browser history showing infection vector
- [ ] Hash values of suspicious files
Need Help?¶
If your Swedish organization needs help analyzing malware or investigating an infection:
Apply to HackAid - Our volunteers have digital forensics training.
Last updated: 2026-01