Remove tag data-localization
article thumbnail

Malware researcher reverse engineered a threat that went undetected for at least 2 years

Security Affairs

Today I’d like to share the following reverse engineering path since it ended up to be more complex respect what I thought. The full path took me about hours work and the sample covers many obfuscation steps and implementation languages. Stage1: JAR invoking JavaScript. This is totally interesting stuff :D.