An overview to unpacking methods, when to apply them and what generic approach to use for unpacking malware. Malware Course: Follow me on Twitter: infographics: Environments/Infographics/ Additional resources: - Packer identification: - Virtualization based obfuscation: - Skim for obvious XOR encryption: - Run and Dump with PE-Sieve: - Debugging and Breakpoints - Agniane Stealer: - Memory Mapping: - Dumpulator: - Self-Extracting Patch:
Hide player controls
Hide resume playing