Remote Symbol Resolution
June 21 2017Introduction The following blog discusses a couple of common techniques that malware uses to obscure its access to the Windows API. In both forms examined, analysts must...
Read moreIntroduction The following blog discusses a couple of common techniques that malware uses to obscure its access to the Windows API. In both forms examined, analysts must...
Read moreIntroduction Ploutus is one of the most advanced ATM malware families we’ve seen in the last few years. Discovered for the first time in Mexico...
Read moreIntroduction Ploutus is one of the most advanced ATM malware families we’ve seen in the last few years. Discovered for the first time in Mexico...
Read moreIntroduction During an investigation, the FLARE team came across an interesting Python malware sample (MD5: 61a9f80612d3f7566db5bdf37bbf22cf ) that is packaged using py2exe. Py2exe is a...
Read moreIntroduction On Feb. 19, IBM XForce researchers released an intelligence report [1] stating that the source code for GM Bot was leaked to...
Read moreIntroduction On Feb. 19, IBM XForce researchers released an intelligence report [1] stating that the source code for GM Bot was leaked to...
Read moreIntroduction On Feb. 19, IBM XForce researchers released an intelligence report [1] stating that the source code for GM Bot was leaked to...
Read moreYou found a malicious executable! Now you've got a crucial question to answer: did the file execute? We'll discuss a few sources of ...
Read moreYou found a malicious executable! Now you've got a crucial question to answer: did the file execute? We'll discuss a few sources of ...
Read moreYou found a malicious executable! Now you've got a crucial question to answer: did the file execute? We'll discuss a few sources of ...
Read more
Recent Comments