Tackling Anti-Analysis Techniques of GuLoader and RedLine Stealer

Using extractors written in Python, we detail our system for extracting internal malware configurations from memory dumps. GuLoader and RedLine Stealer are our examples.

The post Tackling Anti-Analysis Techniques of GuLoader and RedLine Stealer appeared first on Unit 42.

This article has been indexed from Unit 42

Read the original article: