diff --git a/malware-analysis_ref_and_memo.md b/malware-analysis_ref_and_memo.md
index d6c36c3..4d4c7f7 100644
--- a/malware-analysis_ref_and_memo.md
+++ b/malware-analysis_ref_and_memo.md
@@ -24,7 +24,7 @@
|IDA pro|[Lighthouse](https://github.com/gaasedelen/lighthouse)
[UEFI_RETool](https://github.com/yeggor/UEFI_RETool/tree/master/ida_plugin)|Not free|multi||||||
|Binary Ninja|[Lighthouse](https://github.com/gaasedelen/lighthouse)|Not free|||||||
|Cutter|[CutterDRcov](https://github.com/oddcoder/CutterDRcov)
[Jupyter Plugin for Cutter](https://github.com/radareorg/cutter-jupyter)
[x64dbgcutter](https://github.com/yossizap/x64dbgcutter)
[etc.](https://github.com/radareorg/cutter-plugins)|free|multi||||||
-|Ghidra|[pwndra](https://github.com/0xb0bb/pwndra)
[ghidra_scripts](https://github.com/alephsecurity/general-research-tools/tree/master/ghidra_scripts)|free|multi||||||
+|Ghidra|[pwndra](https://github.com/0xb0bb/pwndra)
[ghidra_scripts](https://github.com/alephsecurity/general-research-tools/tree/master/ghidra_scripts)
[OOAnalyzer](https://insights.sei.cmu.edu/sei_blog/2019/07/using-ooanalyzer-to-reverse-engineer-object-oriented-code-with-ghidra.html)|free|multi||||||
|x64/x32dbg|[DbgChild](https://github.com/David-Reguera-Garcia-Dreg/DbgChild)|free|windows||||||
|WinDbg||free|windows|Kernel mode debugging possible|||||
|GDB|gdbpeda
pwngdb|free|linux||||||
@@ -73,12 +73,16 @@
- Fake-net NG
- INetSim
- Noriben
+
### Forensic
-- EQL
- Sysinternals
- Volatility
- malconfscan
- hollowfind
+
+### Threat hunting
+- EQL
+
### Online Sandbox
|name|site|remarks|
|:-|:-|:-|
@@ -111,6 +115,11 @@
[PE-Sieve](https://github.com/hasherezade/pe-sieve)
- PE-Sieveを使用してシステム全体をスキャン
[HollowsHunter](https://github.com/hasherezade/hollows_hunter)
+- ファイルやプロセスメモリ内の文字列の抽出
+[strings2](http://split-code.com/strings2.html)
+- 文字列,正規表現でプロセスメモリをスキャン
+[mnemosyne](https://github.com/nccgroup/mnemosyne)
+[Memory Scraping for Fun & Profit - Matt Lewis, NCC Group at CRESTCon & IIP Congress,youtube](https://www.youtube.com/watch?v=5HdYcE-woDc)
- Injecition/Hollowingされたプロセスの自動検出
[Memhunter](https://github.com/marcosd4h/memhunter)
- **ref:**
@@ -132,7 +141,14 @@
# Doc Analysis
- VBA マクロの解析についての資料
[Advanced VBA Macros Attack&Defence,BHEU2019](https://www.decalage.info/files/eu-19-Lagadec-Advanced-VBA-Macros-Attack-And-Defence.pdf)
+- RTFファイルからOLEパッケージオブジェクトを検出し、埋め込みファイルを抽出
+[rtfobj](https://github.com/decalage2/oletools/wiki/rtfobj)
+
# C2 Analysis
+### Emotet
+- Emotetのc2通信部分のエミュレータ
+[Emutet](https://github.com/d00rt/emotet_network_protocol)
+
### Ursnif
- Ursnif(version 2)のc2通信の仕組みと復号ツールについて
[Writing Malware Traffic Decrypters for ISFB/Ursnif](https://labs.sentinelone.com/writing-malware-traffic-decrypters-for-isfb-ursnif/)
@@ -140,9 +156,13 @@
# Binary Analysis
### Symbolic Execurtion
to do...
+
### Taint Analysis
to do...
+
### Decompiler
+to do...
+
### ref:
- Intel系アーキテクチャSoftware Developer向けのマニュアル
[Intel® 64 and IA-32 Architectures Software Developer Manuals](https://software.intel.com/en-us/articles/intel-sdm)