6.1. Identify the Threat and Attack Vectors
6. Symantec Specific Analysis Steps
6.1. Identify the Threat and Attack Vectors
6.1.0. Acquire Binary
6.1.1. Submit the file to Symantec Response
6.1.2. Upload to VirusTotal.org
6.1.3. Upload to www.threatexpert.com to get High Level overview
6.1.4. Configure SEP to higher security state
6.1.5. Upload to Anubis.iseclab.org
6.1.6. Observed Activity
6.1.7.Run SEP Support tool
6.2. Identify the Infected Computers
6.3. Quarantine the Infected Computers
6.4. Clean the Computers Infected
6.5. Post-op Prevent Recurrence
By
Efrain Ortiz