This presentation was given at 44CON 2014. It provides an introduction to automated extraction of useful indicators of compromise (IOCs) from malware.
Please note that much of the content was given in the talk. No video archive of the talk is available.