This document summarizes how to set up an automated malware analysis environment. It discusses virtualizing the environment using tools like VirtualBox, sandboxing malware samples, and capturing network and system level data during dynamic analysis using tools like Wireshark, Volatility, Sysinternals Suite. It also provides an overview of the analysis process from pre-execution static analysis to post-execution memory dump analysis and outlines some online and offline sandbox options for dynamic analysis. The document concludes with thanking the Matriux community for their support in setting up the environment.