all InfoSec news
Blowing Cobalt Strike Out of the Water With Memory Analysis
Unit42 unit42.paloaltonetworks.com
Unit 42 researchers examine several malware samples that incorporate Cobalt Strike components, and discuss some of the ways that we catch these samples by analyzing artifacts from the deltas in process memory at key points of execution. We will also discuss the evasion tactics used by these threats, and other issues that make their analysis problematic.
The post Blowing Cobalt Strike Out of the Water With Memory Analysis appeared first on Unit 42.
analysis cloud-delivered security services cobalt cobalt strike cortex xdr evasive malware malware memory memory analysis sandbox strike water wildfire