๐ Unleashing YARA โ Part 3
๐ก Newskategorie: Reverse Engineering
๐ Quelle: countuponsecurity.com
In the second post of this series we introduced an incident response challenge based on the static analysis of a suspicious executable file. The challenge featured 6 indicators that needed to be extracted from the analysis in order to create a YARA rule to match the suspicious file. In part 3 we will step through YARA’s […] ...