Jan. 5, 2024, 11 a.m. | Mark Lim and Zong-Yu Wu

Unit42 unit42.paloaltonetworks.com

Using extractors written in Python, we detail our system for extracting internal malware configurations from memory dumps. GuLoader and RedLine Stealer are our examples.


The post Tackling Anti-Analysis Techniques of GuLoader and RedLine Stealer appeared first on Unit 42.

analysis anti-analysis cloud-delivered security services examples guloader internal malware memory memory detection next generation firewall python redline redline infostealer redline stealer stealer system techniques unit 42 wildfire written

More from unit42.paloaltonetworks.com / Unit42

SOC 2 Manager, Audit and Certification

@ Deloitte | US and CA Multiple Locations

Salesforce Solution Consultant

@ BeyondTrust | Remote United States

Divisional Deputy City Solicitor, Public Safety Compliance Counsel - Compliance and Legislation Unit

@ City of Philadelphia | Philadelphia, PA, United States

Security Engineer, IT IAM, EIS

@ Micron Technology | Hyderabad - Skyview, India

Security Analyst

@ Northwestern Memorial Healthcare | Chicago, IL, United States

Werkstudent Cybersecurity (m/w/d)

@ Brose Group | Bamberg, DE, 96052