Malware analysis

In this chapter, the techniques from the previous chapter are used to analyse malware that has been found in the wild. The malware’s techniques will be examined and explained step-by-step in the articles in this chapter.


To contact me, you can e-mail me at [info][at][maxkersten][dot][nl], send me a PM on Reddit or DM me on Twitter @LibraAnalysis.