Behind the scenes we've developed 6 different cryptanalysis techniques for detecting embedded executables, we'll be testing all the methods to determine the most effective and efficient one(s). You may have noticed some clean samples taking a while to run, we've been sequentially exhaustively searching with various techniques to locate embedded executables, a key indicator for a malicious document.
Update: zipdump.py Version 0.0.33
-
This update adds pseudo-field sha256 which can be used to calculate the
sha256 hash of the content (compressed or decompressed):-E sha256:data-E
sha256:dat...
1 week ago
No comments:
Post a Comment