Paolo LuiseUnpacking .NET malware with C# emulationPacked .NET samples usually hide a further stage payload that is unpacked in memory at runtime and loaded as byte reflection without…Feb 13Feb 13
Paolo LuiseThreat Hunting: DNS C2DNS is the protocol used in internal networks and internet to translate mnemonic and easy-to-remember for humans names to IP addresses…Feb 5Feb 5
Paolo LuiseMalware configuration extraction from memoryEvery infrastructure for delivering content has its costs, so system engineers and their managers are constantly involved in searching a…Jul 4, 2023Jul 4, 2023