Zloader Malware Analysis - 1. Unpacking First stage.
Вставка
- Опубліковано 19 вер 2024
- In this video we analyze the Zloader maldoc and intial dll files. We extract the ioc's from the maldoc, then move on to extract the secondary dll payload embedded in the first dll.
Zip file for the malwares: hxxps[://]malware-traffic-analysis[.]net/2020/03/26/2020-03-26-ZLoader-malware-and-artifacts[.]zip
Malware Analysis Course Link: courses.null-c...
Academy Link: ask-academy.live/
Please provide feedback in the comments.
To continue the conversation hit me up on twitter:
🐦 Twitter - / nu11charb
#malware #Zloader #maldoc #reverseengineering
Eagerly waiting for 2nd part 😊
both of you are my favorite researchers... Especially Tiwari, who is my close friend..
Many thanks 🙏
Thank you so much for your videos. I am excited to see you post again.
🙏
Thanks for the great content. If your malware lab is connected to the internet, please do let us know how to set up one.
Hello sir, I am glad that you are back. Don't you use ghidra?
great video, keep going sir.
Sir is there any chance for analysis of zuorat malware?
Hi, What is hash of malware? Thanks.
Link to the zip file is in the description, which has all the files in it. The maldoc and the temp.dll
@@ahmedskasmani Thank you.