Behind the scenes we've developed 6 different cryptanalysis techniques for detecting embedded executables, we'll be testing all the methods to determine the most effective and efficient one(s). You may have noticed some clean samples taking a while to run, we've been sequentially exhaustively searching with various techniques to locate embedded executables, a key indicator for a malicious document.
Update: base64dump.py Version 0.0.29
-
This is a fix for option –yarastrings. base64dump_V0_0_29.zip (http)MD5:
CA3FD00D6AD8B6C0CD091526E3D45D72SHA256:
2B203BF336D4D7971E4277CE9438D271E9F002E75A...
9 hours ago
No comments:
Post a Comment