• Spanish

003 - Analyzing a C2 agent - Part 1: The Dropper

In this first part, we will analyze a malicious macro containing an embedded C2 agent. We will analyze how it acts, what techniques it uses to hinder analysis, and how we can obtain indicators of compromise from it.
Read more →

001 - Intro

Introduction to the blog, where I plan to document the different techniques one can use when analyzing malware, both statically and dynamically.
Read more →
Subscribe
×

Subscribe to Threat Anatomy

Get notified when we post new content!

We respect your privacy. Your email will only be used to notify you about new posts.