Interesting hidden threat since years ?
Today I’d like to share the following reverse engineering path since it ended up to be more complex respect what I thought. The full path took me about hours work and the sample covers many obfuscation steps and implementation languages. During the an… Continue reading Interesting hidden threat since years ?