Malware researcher reverse engineered a threat that went undetected for at least 2 years
Security Affairs
AUGUST 20, 2018
We now have every decoding parameter, we just need to decrypt the classes by using the following data: ClassName. reg file to enumerate tons of security tools that have been widely used by analysts to analyze Malware. VT shows the first time it captured that hash (sha256): it was in 2016. Python Script to Decode AES-KEY.
Let's personalize your content