<img src="https://ws.zoominfo.com/pixel/JrRu3vUM8j33QSR7Bwxw" width="1" height="1" style="display: none;">
December 3, 2019, 12:00 PM ET

Dissection 101: Step-By-Step Static Analysis of Unknown PE files (EXE) to Recognize Malware and Assess Impact

Ultimate IT Security Webinar Event

In this webinar, we’re going to show you how to manually perform basic static analysis of a PE (portable executable – usually an .exe file). We’ll use free utilities designed for this purpose. I’ll show you how to confirm that a file really is a PE. Then I’ll show you the structure of a PE including:


The session won’t make you an expert in static file analysis but it will help you grasp the fundamentals and make you more effective at using malware analysis, understanding indicators of compromise, and getting pointed in the right direction if you want to dig deeper into static analysis.

But at the end of the day you can only manually analyze so many files each day. ReversingLabs is the perfect sponsor for this event and Robert Perica, a Principal Engineer/ Threat Analyst at ReversingLabs will briefly show you their extremely fast and deep automated static file analysis Titanium Platform technology.