Analyzing Malicious Microsoft Office Word Document | HackTheBox Emo
We covered analyzing an office document that has an embedded Macro code written in Visual Basic. The document was…
We covered analyzing an office document that has an embedded Macro code written in Visual Basic. The document was…
We covered the second part of malware static analysis. We went through analyzing strings, hashes and signatures. This was…
We covered debugging as a method to uncover evasion used by malwares to evade detection. This was part of…
Hunting viruses and malwares take more than static or dynamic analysis alone. Usually a combination of different techniques such…
Premise In this video walkthrough, we covered the basics of Yara file pattern matching to analyze Malwares based on…