In the previous article, I analyzed the Bandios dropper. In this article, I’m going to analyze two of the dropped
Continue reading
Vestigium
In the previous article, I analyzed the Bandios dropper. In this article, I’m going to analyze two of the dropped
Continue readingFor a long time, I have wanted to analyze a rootkit. Especially, after watching the first episode of Mr. Robot
Continue readingPart 1/3 ended when we saw an executable decrypted in memory and then executed. In this article, I’ll describe the
Continue readingIn the previous article, we looked at the analysis of the Gozi/Ursnif downloader. For this article, I picked up the
Continue reading