Behind the scenes we've developed 6 different cryptanalysis techniques for detecting embedded executables, we'll be testing all the methods to determine the most effective and efficient one(s). You may have noticed some clean samples taking a while to run, we've been sequentially exhaustively searching with various techniques to locate embedded executables, a key indicator for a malicious document.
Update: cs-decrypt-metadata.py Version 0.0.5
-
This is a bugfix version. cs-decrypt-metadata_V0_0_5.zip (http)MD5:
3C37C994709AAE7F56FEC8C8A35F6A61SHA256:
A47616A8C7A484A70D011EA4B8189097CF6FD61358DAEA8...
2 weeks ago
No comments:
Post a Comment