Already detected 2 malicious PE files with a ‘/‘ in the filename. The goal is to try to break analysis on sandboxes/tools running on *NIX?
-
-
Seems to be a Windows-1521 encoded string which breaks my analysis script (“/“ in the name) Need to check further… Maybe FP?
Thanks. Twitter will use this to make your timeline better. UndoUndo
-
Loading seems to be taking a while.
Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.