#Malware  #Analysis – Dridex Loader – Part 2

#Malware  #Analysis – Dridex Loader – Part 2

http://ift.tt/2bInDcs

On our last blog post, we performed malware analysis of Dridex and found out how to decode its strings. This gave us more visibility into its intent and functionality. In this part we will continue the analysis and move into getting the Dridex configuration settings and XML messages that are generated and exchanged with the…

See it on Scoop.it, via Advanced Threats,Intelligence Technology,CyberSecurity

APT

via Advanced Threats,Intelligence Technology,CyberSecurity | Scoop.it http://ift.tt/1PrSk69

August 31, 2016 at 02:45AM


Posted

in

by

Tags:

Comments

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s

%d bloggers like this: