Reversing malware in a custom format: Hidden Bee elements
Credit to Author: hasherezade| Date: Thu, 30 Aug 2018 15:41:34 +0000
When we recently analyzed payloads related to Hidden Bee (dropped by the Underminer EK), we noticed something unusual. After reversing the malware, we discovered that its authors actually created their own executable format. Follow our step-by-step analysis for a closer look. Categories: Tags: custom malwarehidden beehidden bee minerpayloadreverse engineeringreversing malware |
The post Reversing malware in a custom format: Hidden Bee elements appeared first on Malwarebytes Labs.
Read more