After introducing a couple of common techniques that malware uses to obscure its access to the Windows API, we present an open source tool we developed that can be used to resolve addresses from a process running in a virtual machine by an IDA script.Read more...
Entries filed under 'David Zimmer'
Threat Research Blog
FireEye posts blog entries under threat research to present and discuss cyber attacks and threat intelligence from a technical perspective. These blog posts cover everything from exploits and vulnerabilities, to advanced malware and targeted attacks.