Source |
Fortinet |
Identifiant |
363557 |
Date de publication |
2017-05-09 11:11:59 (vue: 2017-05-09 11:11:59) |
Titre |
Deep Analysis of New Emotet Variant – Part 2 |
Texte |
This is the second part of FortiGuard Labs' deep analysis of the new Emotet variant. In the first part of the analysis we demonstrated that by bypassing the server-side Anti-Debug or Anti-Analysis technique we could download three or four modules (.dll files) from the C&C server. In that first blog we only analyzed one module (I named it 'module2'). In this blog, we'll review how the other modules work. Here we go. |
Notes |
|
Envoyé |
Oui |
Condensat |
analysis analyzed anti blog bypassing c&c could debug deep demonstrated dll download emotet files first fortiguard four from here how labs module module2 modules named new one only other part review second server side technique three variant work |
Tags |
|
Stories |
|
Move |
|