Linux Ransomware Analysis with Ghidra & Any.Run
We analyzed a sample Linux ransomware using reverse engineering tools such as Ghidra and Radare2. Additionally, we…
We analyzed a sample Linux ransomware using reverse engineering tools such as Ghidra and Radare2. Additionally, we…
We covered analyzing Windows events logs using Python-evtx and chainsaw. We started with extracting Powershell logs and…
In this post, we investigated the Conti ransomware that hit Microsoft Exchange via a series of vulnerabilities….
Introduction We demonstrated ransomware recovery by recovering files using the Windows Shadow Volume Copy feature. This was…
Introduction In this video walk-through, we covered investigating BlackMatter ransomware with ProcDOT. You can use ProcDOT to…
Premise The video is a technical walkthrough focused on using Splunk to investigate a ransomware attack scenario….