Pillar A: CybersecurityA21

Malware Analysis & Reverse Engineering

Static/dynamic analysis, sandbox analysis, assembly/disassembly, packer analysis, YARA rules, malware family classification.

Part of Pillar A: Cybersecurity · Cybersecurity groups the disciplines that share methods, tools, and threat models with Malware Analysis & Reverse Engineering.

What is Malware Analysis & Reverse Engineering?

Malware analysis and reverse engineering is the discipline of understanding the adversary's weapons at the code level. When a new malware sample is discovered — whether through incident response, threat hunting, or sandbox detonation — analysts dissect it to understand its capabilities, extract indicators of compromise, map it to ATT&CK techniques, and build defenses.

Static analysis examines the malware without executing it — inspecting PE headers, import tables, embedded strings, and entropy patterns. Dynamic analysis runs the malware in a controlled sandbox environment, monitoring API calls, file system changes, registry modifications, and network communications. Advanced analysis involves disassembly and debugging to understand the malware's logic at the assembly level.

The field requires deep technical skills — reading x86/x64 assembly, understanding Windows internals, recognizing packer and obfuscation techniques, and writing YARA rules for detection. Tools like IDA Pro, Ghidra, x64dbg, and Volatility are the analyst's essential toolkit.

Why it matters

Every detection rule, threat intelligence report, and incident response action is ultimately informed by someone who analyzed the malware. RE is the foundation that powers threat intelligence, detection engineering, and defensive tool development.

Malware analysis feeds directly into threat intelligence (extracting IOCs and TTPs), detection engineering (writing YARA/SIGMA rules), and incident response (understanding what the attacker's tools do). It's the technical foundation beneath multiple security disciplines.

Standards and frameworks

Curated resources

Authoritative sources we ground Malware Analysis & Reverse Engineering questions in — frameworks, research, guides, and tools.

Certifications that signal this domain

Credentials whose blueprint meaningfully covers this domain. Core means centrally covered; also touched means present in the blueprint but not the primary focus.

Core coverage

CHFIProfessional·EC-CouncilOfficial page →

EC Council Computer Hacking Forensics Investigator

EC Council Computer Hacking Forensics Investigator

CRTO IIProfessional·Zero-Point SecurityOfficial page →

Zero Point Security Red Team Operator II

Zero Point Security Red Team Operator II

GCFAProfessional·GIAC / SANSOfficial page →

GIAC Certified Forensic Analyst

Advanced host forensics, memory analysis, timeline reconstruction.

GREMExpert·GIAC / SANSOfficial page →

GIAC Reverse Engineering Malware

Static + dynamic malware analysis, unpacking, custom RE tooling.

GXPNExpert·GIACOfficial page →

GIAC Exploit Researcher and Advanced Penetration Tester

GIAC Exploit Researcher and Advanced Penetration Tester

OSCE3Expert·OffSecOfficial page →

Offensive Security Certified Expert 3

Offensive Security Certified Expert 3

OSEDProfessional·OffSecOfficial page →

Offensive Security Exploit Developer

Offensive Security Exploit Developer

OSEEExpert·OffSecOfficial page →

Offensive Security Exploitation Expert

Offensive Security Exploitation Expert

OSMRProfessional·OffSecOfficial page →

Offensive Security MacOS Researcher

Offensive Security MacOS Researcher

Also touched

GCIHProfessional·GIAC / SANSOfficial page →

GIAC Certified Incident Handler

Incident handling methodology and lifecycle.

GCTIProfessional·GIAC / SANSOfficial page →

GIAC Cyber Threat Intelligence

Structured threat intel production, ATT&CK, analytic tradecraft.

OSCPProfessional·OffSecOfficial page →

Offensive Security Certified Professional

Hands-on penetration testing — exploitation, privilege escalation, AD attacks.

Browse all certifications → — pick a cert on the interactive map to highlight every domain it covers.

Education and certifications

More in Cybersecurity

Test what you know about Malware Analysis & Reverse Engineering

110 questions available. Beginner to expert questions, scored against the global leaderboard.