Yevhen Protsenko

Yevhen Protsenko

Malware Analyst And Reverse Engineer @ Intel 471

About Yevhen Protsenko

Yevhen Protsenko is a Malware Analyst and Reverse Engineer at Intel 471, where he has worked since 2018. He specializes in malware research using both static and dynamic analysis techniques and develops tools to automate tasks related to malware analysis.

Work at Intel 471

Yevhen Protsenko has been employed at Intel 471 since 2018, serving as a Malware Analyst and Reverse Engineer. In this role, he focuses on analyzing malware and developing tools to enhance the efficiency of malware research. His work involves both static and dynamic analysis techniques, which are essential for understanding the behavior and characteristics of malicious software.

Malware Analysis Techniques

Protsenko employs a variety of techniques in malware research, including static and dynamic analysis. He utilizes the Cuckoo and Cape sandbox environments for in-depth malware analysis, allowing for the observation of malware behavior in a controlled setting. His expertise in these areas contributes to the identification and understanding of malware threats.

Tool Development for Malware Research

In addition to analysis, Yevhen Protsenko develops tools aimed at automating tasks related to malware research. This includes creating extractors and emulators for various malware families, which streamline the process of extracting malware configuration files and enhance the overall efficiency of malware analysis.

Expertise in Malware Analysis Frameworks

Protsenko has significant expertise in using the Rekall Framework for malware analysis. This framework aids in memory analysis and forensics, allowing for a deeper understanding of malware behavior and its impact on systems. His proficiency in these tools supports his role in identifying and mitigating malware threats.

People similar to Yevhen Protsenko