Quantcast
Channel: Bob Jung, Author at Unit 42
Browsing latest articles
Browse All 5 View Live

Blowing Cobalt Strike Out of the Water With Memory Analysis

Unit 42 researchers examine several malware samples that incorporate Cobalt Strike components, and discuss some of the ways that we catch these samples by analyzing artifacts from the deltas in process...

View Article



Navigating the Vast Ocean of Sandbox Evasions

After creating a bespoke sandbox environment, we discuss techniques used to target malware evasions with memory detection and more. The post Navigating the Vast Ocean of Sandbox Evasions appeared first...

View Article

Machine Learning Versus Memory Resident Evil

Malware detection accuracy through memory detection and other tools highlights how to counter increasingly evasive malware types. The post Machine Learning Versus Memory Resident Evil appeared first on...

View Article

Tailoring Sandbox Techniques to Hidden Threats

Techniques such as dependency emulation and analysis of encrypted network traffic can help detect malware samples that would not normally execute in a sandbox environment. The post Tailoring Sandbox...

View Article

Teasing the Secrets From Threat Actors: Malware Configuration Parsing at Scale

Configuration data – which is historically tricky to parse – can be parsed directly from memory. We use the information-stealer IcedID as an example to cover the technique. The post Teasing the Secrets...

View Article

Browsing latest articles
Browse All 5 View Live




Latest Images