Analyzing Malicious Microsoft Office Word Document | HackTheBox Emo
We covered analyzing an office document that has an embedded Macro code written in Visual Basic. The…
We covered analyzing an office document that has an embedded Macro code written in Visual Basic. The…
We covered the second part of malware static analysis. We went through analyzing strings, hashes and signatures….
We covered debugging as a method to uncover evasion used by malwares to evade detection. This was…
Hunting viruses and malwares take more than static or dynamic analysis alone. Usually a combination of different…
Premise In this video walkthrough, we covered the basics of Yara file pattern matching to analyze Malwares…