Using extractors written in Python, we detail our system for extracting internal malware configurations from memory dumps. GuLoader and RedLine Stealer are our examples.
The post Tackling Anti-Analysis Techniques of GuLoader and RedLine Stealer appeared first on Unit 42.
This article has been indexed from Unit 42