Media Summary: In this video we introduce the formula view, which is extremely useful when analyzing We have uploaded a version of the same video with a better audio here: Using Cerbero Suite to ... You can find the script used in the video on our blog: More information at:

50 Seconds Obfuscated Excel Malware Analysis - Detailed Analysis & Overview

In this video we introduce the formula view, which is extremely useful when analyzing We have uploaded a version of the same video with a better audio here: Using Cerbero Suite to ... You can find the script used in the video on our blog: More information at: In case you didn't have time for our 2-minutes introduction to the topic ( :) More information at: ... Fireeye made a white paper on cmd.exe command If you would like to support the channel and I, check out Kite! Kite is a coding assistant that helps you code faster, on any IDE offer ...

Integrate ANY.RUN solutions into your company: ... This is the sample that we unpacked in the previous episode. It is Macro extraction and deobfuscation using oletools and MS In this and the next video we'll analyse a sample from the popular Emotet

Photo Gallery

50-Seconds Obfuscated Excel Malware Analysis
IcedId Excel Malware 50-Seconds Complete Analysis
20-Seconds Excel Malware Analysis
2-Minutes QakBot Excel Malware Analysis
Dynamic Analysis of Obfuscated Excel 4 Macros
Blitz 19 Seconds Excel Malware Analysis
28-Seconds Malicious Microsoft Excel Document Analysis
Malware Analysis - DOSfuscation Deobfuscation
MALWARE ANALYSIS - VBScript Decoding & Deobfuscating
THIS EXCEL FILE is DANGEROUS! | Malware Analysis with ANY.RUN
Automate Labeling Of Obfuscated APIs In Malware
Malware Analysis - .NETReactor deobfuscation and configuration extraction of AgentTesla
View Detailed Profile
50-Seconds Obfuscated Excel Malware Analysis

50-Seconds Obfuscated Excel Malware Analysis

In this video we introduce the formula view, which is extremely useful when analyzing

IcedId Excel Malware 50-Seconds Complete Analysis

IcedId Excel Malware 50-Seconds Complete Analysis

This

20-Seconds Excel Malware Analysis

20-Seconds Excel Malware Analysis

We have uploaded a version of the same video with a better audio here: https://youtu.be/eIK3KAcVtXw Using Cerbero Suite to ...

2-Minutes QakBot Excel Malware Analysis

2-Minutes QakBot Excel Malware Analysis

You can find the script used in the video on our blog: https://cerbero-blog.com/?p=1971 More information at: https://cerbero.io.

Dynamic Analysis of Obfuscated Excel 4 Macros

Dynamic Analysis of Obfuscated Excel 4 Macros

https://www.twitch.tv/mattifestation/

Blitz 19 Seconds Excel Malware Analysis

Blitz 19 Seconds Excel Malware Analysis

Using Cerbero Suite to

28-Seconds Malicious Microsoft Excel Document Analysis

28-Seconds Malicious Microsoft Excel Document Analysis

In case you didn't have time for our 2-minutes introduction to the topic (https://youtu.be/pSWfD-lMf4I). :) More information at: ...

Malware Analysis - DOSfuscation Deobfuscation

Malware Analysis - DOSfuscation Deobfuscation

Fireeye made a white paper on cmd.exe command

MALWARE ANALYSIS - VBScript Decoding & Deobfuscating

MALWARE ANALYSIS - VBScript Decoding & Deobfuscating

If you would like to support the channel and I, check out Kite! Kite is a coding assistant that helps you code faster, on any IDE offer ...

THIS EXCEL FILE is DANGEROUS! | Malware Analysis with ANY.RUN

THIS EXCEL FILE is DANGEROUS! | Malware Analysis with ANY.RUN

Integrate ANY.RUN solutions into your company: ...

Automate Labeling Of Obfuscated APIs In Malware

Automate Labeling Of Obfuscated APIs In Malware

View our

Malware Analysis - .NETReactor deobfuscation and configuration extraction of AgentTesla

Malware Analysis - .NETReactor deobfuscation and configuration extraction of AgentTesla

This is the sample that we unpacked in the previous episode. It is

Excel File Dangerous? How to Check for Malware in Seconds!

Excel File Dangerous? How to Check for Malware in Seconds!

Excel

#obfuscated|#packed|Packed and Obfuscated Malware|Basic Malware Analysis|#Malware|LECTURE#9

#obfuscated|#packed|Packed and Obfuscated Malware|Basic Malware Analysis|#Malware|LECTURE#9

This Lecture will discuss: Packed and

In-Depth Obfuscated VBA Analysis

In-Depth Obfuscated VBA Analysis

You can find the scripts used to

Malware Analysis - Macro Malware Analysis

Malware Analysis - Macro Malware Analysis

Macro extraction and deobfuscation using oletools and MS

Emotet Malware Analysis - Part 2 - Deobfuscating PowerShell

Emotet Malware Analysis - Part 2 - Deobfuscating PowerShell

In this and the next video we'll analyse a sample from the popular Emotet