paint-brush
Analyzing GuLoader: How to Approach Deobfuscation of Complex Samples by@anyrun
398 reads
398 reads

Analyzing GuLoader: How to Approach Deobfuscation of Complex Samples

by ANY.RUN6mJune 22nd, 2023
Read on Terminal Reader
Read this story w/o Javascript

Too Long; Didn't Read

This article focuses on static analysis, but if you want to analyze a Gu loader sample dynamically, you can use **ANYRUN** cloud malware sandbox. Visit our blog to find the sample we'll analyze, as well as unpacking instructions and a Ghidra script that partially automates much of what we’re going to cover.
featured image - Analyzing GuLoader: How to Approach Deobfuscation of Complex Samples
ANY.RUN HackerNoon profile picture
ANY.RUN

ANY.RUN

@anyrun

ANY.RUN is an online interactive cloud-based sandbox for malware analysis.

0-item

STORY’S CREDIBILITY

Guide

Guide

Walkthroughs, tutorials, guides, and tips. This story will teach you how to do something new or how to do something better.

L O A D I N G
. . . comments & more!

About Author

ANY.RUN HackerNoon profile picture
ANY.RUN@anyrun
ANY.RUN is an online interactive cloud-based sandbox for malware analysis.

TOPICS

Languages

THIS ARTICLE WAS FEATURED IN...

Permanent on Arweave
Read on Terminal Reader
Read this story in a terminal
 Terminal
Read this story w/o Javascript
Read this story w/o Javascript
 Lite
Twitter