How can the nature and capabilities of a suspicious file be determined? Incident responders, SOC analysts, and other practitioners can use a variety of free Linux tools for malware analysis, even if the malware aims to infect a Windows system. This practical session will show attendees how to get started with malware analysis using a variety of Linux tools, using the free REMnux toolkit for the examples.