March 16, 2023, 5:29 p.m. | Guided Hacking

Guided Hacking www.youtube.com

Learn how to analyze malicious OneNote Documents
Support us on GH: https://guidedhacking.com/register/
Support us on Patreon: https://patreon.com/guidedhacking
Support us on YT: https://www.youtube.com/channel/UCCMi6F5Ac3kQDfffWXQGZDw/join

Recently, there has been a surge in the use of OneNote documents as a vehicle for malware distribution by both commodity e-crime actors and more sophisticated threat actors. In response to this new emerging threat, we employed our malware analysis skills to dissect a OneNote document and understand its functioning.

OneNote Malware Analysis Article here:
https://guidedhacking.com/threads/analyzing-malicious-onenote-documents-spreading-asyncrat.20306/

Our analysis …

analysis article crime distribution document documents emerging emerging threat learn malicious malware malware analysis malware distribution onenote response skills strings threat threat actors understand vehicle

SOC 2 Manager, Audit and Certification

@ Deloitte | US and CA Multiple Locations

Information Security Engineers

@ D. E. Shaw Research | New York City

Cyber Security Architect - SR

@ ERCOT | Taylor, TX

SOC Analyst

@ Wix | Tel Aviv, Israel

Associate Director, SIEM & Detection Engineering(remote)

@ Humana | Remote US

Senior DevSecOps Architect

@ Computacenter | Birmingham, GB, B37 7YS