Media Summary: DISCLAIMER: NO SOUND (Intentional) Objective is to uncover the payload and the URLs that it's retrieved from by ... We look at two techniques for MS Office files to load and execute Day 87 of Becoming a SOC Analyst — SOC109
Malware Analysis Malicious Document Emotet - Detailed Analysis & Overview
DISCLAIMER: NO SOUND (Intentional) Objective is to uncover the payload and the URLs that it's retrieved from by ... We look at two techniques for MS Office files to load and execute Day 87 of Becoming a SOC Analyst — SOC109 Today we tackle the new exercises in Lets Defend, these are OLEVBA - 1:58 - Extract Macro with olevba 2:40 - ExifTool to examine Subscribe: Build real confidence analyzing
In this workshop (2 hours), I explain how to use the tools (oledump, emldump, YARA rules, …) I developed to In this and the next video we'll analyse a sample from the popular The OneNote abuse continues! FREE DOWNLOADABLE PDF - In this video, I analyzed a Microsoft Word