Self Modifying Code Decoding encoded code from duta section and secute it
15
PI Call Obfuscation - API Function resolution Part 2
16
Basics - 64bit API calls
17
Obfuscate Syscalls
18
Basics - WoW64 - Subsystem
19
Heavens Gate - Obfuscation
20
Decrypt Payload
21
First Clue
22
Infection Chain
23
Powershell Loader
24
Initial Infection Vector
25
What Can Defenders Do?
26
Hunting for Loaders
27
Dynamic Data Resolver Version 1.0
Description:
Analyze recent evolutions in malware loaders in this 54-minute conference talk from the Hack In The Box Security Conference. Explore the significant increase in malware loader volume and variety over the past year, examining how adversaries are shifting from malvertising to creating new botnets for distributing various malware payloads. Delve into the characteristics of this new generation of malware loaders, including increased obfuscation, modularization, and flexibility. Learn about techniques for hunting these loaders in corporate environments and methods for more effective analysis. Gain insights from Cisco Talos threat researchers as they discuss the changing landscape of malware distribution, multi-stage delivery tactics, and evasion techniques employed by cybercriminals.