Book Summary – “Evasive Malware: Understanding Deceptive and Self-Defending Threats”
Tags
cmtmf-attack-pattern: | Process Injection |
attack-pattern: | Data Hardware - T1592.001 Hooking - T1617 Malware - T1587.001 Malware - T1588.001 Process Injection - T1631 Software - T1592.002 Hooking - T1179 Process Injection - T1055 Hooking |
Common Information
Type | Value |
---|---|
UUID | a88bf1f4-73b3-45a7-9525-03c2fbf8097d |
Fingerprint | fd24592d4dfb079b |
Analysis status | DONE |
Considered CTI value | 0 |
Text language | |
Published | May 20, 2023, 8:22 p.m. |
Added to db | Nov. 9, 2023, 1:22 a.m. |
Last updated | Aug. 31, 2024, 2:51 p.m. |
Headline | Book Summary – “Evasive Malware: Understanding Deceptive and Self-Defending Threats” |
Title | Book Summary – “Evasive Malware: Understanding Deceptive and Self-Defending Threats” |
Detected Hints/Tags/Attributes | 36/2/0 |
Source URLs
Redirection | Url | |
---|---|---|
Details | Source | https://securityliterate.com/evasive-malware-book/ |
URL Provider
RSS Feed
Details | Id | Enabled | Feed title | Url | Added to db |
---|---|---|---|---|---|
Details | 231 | ✔ | Kyle Cucci's Cyber Ramblings | https://securityliterate.com/feed/ | 2024-08-30 22:08 |