Analyzing Modern Malware Techniques Part 4
I’m afraid of no packer If you’re going to analyze malware you are going to run into packers, code injections, obfuscated code and what not. If one doesn’t possess the correct knowledge or the corr...
I’m afraid of no packer If you’re going to analyze malware you are going to run into packers, code injections, obfuscated code and what not. If one doesn’t possess the correct knowledge or the corr...
A case of Powershell, Excel 4 Macros and VB6(part 2 of 2) When I was watching The Cycle Of Cyber Threat Intelligence the other day I learned about the concept called “Biases” and how it interferes ...
A case of Powershell, Excel 4 Macros and VB6(part 1 of 2) In continuation of my previous article, I wanted to focus on the next techniques I listed in my previous article(Macros and Powershell), th...
Fileless Malware - A self loading technique Fileless malware is nothing new, but is very much used today. The idea is to load a payload into memory and to leave as much as little evidence as possib...