-
-
PEBby Injector
How malware can retrieve base address of loaded modules in order to resolve specific functions.
-
Lotus Blossom Dropper
Code analysis of a dropper developed and deployed during espionage campaigns by Chinese nexus threat group Lotus Blossom.
-
AMSI bypuss 0x3
This technique permit to achieve another AMSI bypass via hardware breakpoints. How can we detect this kind of technique? keep reading.
-
PPL process dump
What is it a PP/PPL process, how can we bypass it and how can we detect related bypass attempt pattern? keep reading.