![]() ![]() ![]() Firstly, we are going to go through the source code and find out what is the important information that we can extract out. Now, let’s start getting our hands dirty…and open the suspicious. The password to the attachment is “ infected29A” ![]() Do note, this is a MALICIOUS file, so please do the analysis in a “ safe” environment. I will try to fill in required information about where to look out for information and how decode some of the information. Today I will go through with you on how we can make Profiler work extra hard for us. Even though AndroRat ( ) had been around for eons and the source code was made available ( ) but there are many new ones popping out everyday.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |