Windows PE Malware Analysis Part IV
Overview In Part III we learned how to use x32dbg and performed code analysis on our malicious specimen which uncovered several indicators of compromise. We ...
Overview In Part III we learned how to use x32dbg and performed code analysis on our malicious specimen which uncovered several indicators of compromise. We ...
Overview In Part II we concluded our static analysis by becoming familiar with IDA Pro and using it to confirm one of our previous findings and to examine ob...
Overview In Part I we conducted static analysis using basic tools and techniques on a malicious Windows portable executable and came up with several findings...
Introduction In this article I will be examining a Windows executable malware specimen. Based on a couple reports from automated malware sandboxes, the spec...
In my last two posts, I discussed my experience with AWAE/OSWE and ETBD/OSEP and how they are two of the trinity in obtaining the coveted OSCE3 certificati...