Tackling Anti-Analysis Techniques of GuLoader and RedLine Stealer
Unit42
2024-01-05 19:00:53
收藏
Using extractors written in Python, we detail our system for extracting internal malware configurations from memory dumps. GuLoader and RedLine Stealer are our examples.
The post Tackling Anti-Analysis Techniques of GuLoader and RedLine Stealer appeared first on Unit 42.
目录
最新
- New Prompt Injection Attack Vectors Through MCP Sampling
- Critical Vulnerabilities in React Server Components and Next.js
- The Browser Defense Playbook: Stopping the Attacks That Start on Your Screen
- The Golden Scale: 'Tis the Season for Unwanted Gifts
- The Dual-Use Dilemma of AI: Malicious LLMs
- Anatomy of an Akira Ransomware Attack: When a Fake CAPTCHA Led to 42 Days of Compromise
- Digital Doppelgangers: Anatomy of Evolving Impersonation Campaigns Distributing Gh0st RAT
- You Thought It Was Over? Authentication Coercion Keeps Evolving