Instructor: Marion Marschalek
Dates: June 15 to 18 2026
Capacity: 25
This course aims to teach reverse engineers the world of malware, with a primary focus on Windows, while also shining a light on other platforms. Students will learn how to take apart about any malicious binary that comes their way, through combining state-of-the-art malware analysis tooling with advanced reverse engineering skills. This includes understanding and circumventing advanced self-protection mechanisms that modern day malware tends to employ.
In reality the analyst doesn't get to choose what type of malware lands on their dissection table. The sample could be your average C-written, loosely protected, and relatively small espionage bot. Or, it could be plain shellcode, or a highly complex piece of targeted malware, or a sophisticatedly packed ransomware, or a large Delphi binary with no prior verdict, or god forbid a Rust executable that has no useful indicators to it whatsoever.
This course aims to prepare analysts for all of these possibilities, to be able to handle what the modern day threat landscape has to give on a daily basis. The course starts out with Windows malware, but we'll also tackle Linux and MacOS malware, and do side quests on ARM samples. This challenge is intended to bring students closer to the level of universal binary understanding with the latest tools and techniques.
Day 1 of this training will bring students up to speed on common Windows malware and provide a recap of fundamentals, to then from there branch out on how to conquer other operating systems, file formats, and assembly languages. This first day will also have a lot of hands-on exercises to manifest foundations and teach the class the nifty tricks it often takes to reverse engineer a binary that doesn't want to be analyzed.
Day 2 will jump in on the deep end with defense mechanisms that malware is usually equipped with, since this is most often the first things an analyst encounters in the analysis process. We'll cover basic and advanced anti-analysis measures that thwart off static and dynamic tooling, and cover how to identify and circumvent these techniques. The class will learn how to see through the confusion malware tries to sow, using obfuscation, debugger and sandbox detection, multi-layered software packers and advanced stealth mechanisms.
On day 3 the class will get intense with revers engineering challenges that stem from compilers rather than obfuscation. I have seen entire analyst teams shudder at the prospect of having to proof the benignness of a reasonably big Delphi executable. But fear not, there are techniques that allow us to understand even the strangest products of a given build chain. This module includes Go and Rust malware, the newest additions to the pantheon of binary oddities.
Finally, on day 4 students will learn the world of exploit analysis, targeted malware, and rootkits. What do we do if all we have is a piece of shellcode, or only a piece of the puzzle in case of modular malware? Targeted malware is sophisticated in its own, typically less packed and obfuscated, more stealthy, and complex in its goal and purpose. We'll also shine a light on the role of rootkits these days, and how to tackle them as a reverse engineer. Finally the class wraps up with an analysis automation chapter, showing the power of analysis tool scripting.
Marion Marschalek is an independent security consultant and trainer with her consulting company Hack & Cheese. Prior to that she held senior positions at AWS and Intel, and different roles in the threat detection industry, as a malware reverse engineer and incident responder. Marschalek is a frequent speaker at major security conferences, including Black Hat, Defcon, HITB, RSA, and SyScan, among others. She used to teach reverse engineering classes at University of Applied Sciences St. Poelten, from where she graduated in 2011 with a Master's Degree in Information Security. In 2015 she started a hacker bootcamp for women titled BlackHoodie, which over the years established itself as a global initiative to attract more diverse talent to the security industry. In her spare time she enjoys long distance running.
Click here to register.