all InfoSec news
Teasing the Secrets From Threat Actors: Malware Configuration Parsing at Scale
May 3, 2023, 1 p.m. | Mark Lim, Daniel Raygoza and Bob Jung
Unit42 unit42.paloaltonetworks.com
Configuration data – which is historically tricky to parse – can be parsed directly from memory. We use the information-stealer IcedID as an example to cover the technique.
The post Teasing the Secrets From Threat Actors: Malware Configuration Parsing at Scale appeared first on Unit 42.
advanced wildfire configuration data icedid information malware memory memory detection parsing scale secrets stealer threat threat actors unit 42 wildfire
More from unit42.paloaltonetworks.com / Unit42
Jobs in InfoSec / Cybersecurity
Information Technology Specialist II: Network Architect
@ Los Angeles County Employees Retirement Association (LACERA) | Pasadena, CA
Cybersecurity Skills Challenge -- Sponsored by DoD
@ Correlation One | United States
Security Operations Center (SOC) Analyst
@ GK Cybersecurity Group | Remote
Engineering Manager - Cloud Security team
@ SentinelOne | Prague, Czech Republic
Legal & Compliance Apprentice (H/F)
@ Novo Nordisk | Puteaux, Île-de-France, FR
Manager, Governance Risk & Compliance
@ Comcast | Virtual