all InfoSec news
Tackling Anti-Analysis Techniques of GuLoader and RedLine Stealer
Jan. 5, 2024, 11 a.m. | Mark Lim and Zong-Yu Wu
Unit42 unit42.paloaltonetworks.com
Using extractors written in Python, we detail our system for extracting internal malware configurations from memory dumps. GuLoader and RedLine Stealer are our examples.
The post Tackling Anti-Analysis Techniques of GuLoader and RedLine Stealer appeared first on Unit 42.
analysis anti-analysis cloud-delivered security services examples guloader internal malware memory memory detection next generation firewall python redline redline infostealer redline stealer stealer system techniques unit 42 wildfire written
More from unit42.paloaltonetworks.com / Unit42
Jobs in InfoSec / Cybersecurity
SOC 2 Manager, Audit and Certification
@ Deloitte | US and CA Multiple Locations
Salesforce Solution Consultant
@ BeyondTrust | Remote United States
Divisional Deputy City Solicitor, Public Safety Compliance Counsel - Compliance and Legislation Unit
@ City of Philadelphia | Philadelphia, PA, United States
Security Engineer, IT IAM, EIS
@ Micron Technology | Hyderabad - Skyview, India
Security Analyst
@ Northwestern Memorial Healthcare | Chicago, IL, United States
Werkstudent Cybersecurity (m/w/d)
@ Brose Group | Bamberg, DE, 96052