6.1.0. Acquire Binary
6.1. Identify the Threat and Attack Vectors
6.1.0. Acquire Binary
6.1.0.1. Simply copy the file.
6.1.0.2. Execute AutoRuns for manual Load Point Analysis
6.1.0.3. Execute Process Explorer for manual Process Analysis
6.1.1. Submit the file to Symantec Response
6.1.2. Upload to VirusTotal.org
6.1.3. Upload to www.threatexpert.com to get High Level overview
6.1.4. Configure SEP to higher security state
6.1.5. Upload to Anubis.iseclab.org
6.1.6. Observed Activity
6.1.7.Run SEP Support tool
By
Efrain Ortiz