paint-brush
分析 GuLoader:如何实现复杂样本的反混淆经过@anyrun
422 讀數
422 讀數

分析 GuLoader:如何实现复杂样本的反混淆

经过 ANY.RUN6m2023/06/22
Read on Terminal Reader

太長; 讀書

本文重点介绍静态分析,但如果您想动态分析 Gu 加载程序样本,可以使用 **ANYRUN** 云恶意软件沙箱。请访问我们的博客,找到我们将分析的示例,以及解包说明和 Ghidra 脚本,该脚本部分自动化了我们将要介绍的大部分内容。
featured image - 分析 GuLoader:如何实现复杂样本的反混淆
ANY.RUN HackerNoon profile picture
ANY.RUN

ANY.RUN

@anyrun

ANY.RUN is an online interactive cloud-based sandbox for malware analysis.

0-item

STORY’S CREDIBILITY

Guide

Guide

Walkthroughs, tutorials, guides, and tips. This story will teach you how to do something new or how to do something better.

L O A D I N G
. . . comments & more!

About Author

ANY.RUN HackerNoon profile picture
ANY.RUN@anyrun
ANY.RUN is an online interactive cloud-based sandbox for malware analysis.

標籤

Languages

这篇文章刊登在...

Read on Terminal Reader
Read this story in a terminal
 Terminal
Read this story w/o Javascript
Read this story w/o Javascript
 Lite