Videos
Published on February 12th, 2017 📆 | 2010 Views ⚑
0Malware Analysis – Exploring Spora's Encryption Procedure
iSpeech
Using Spora as example we learn how to use articles about malware families as an aid for learning malware analysis. We unpack Spora and take a look at the part of Spora's encryption prodecure that encrypts the .KEY file.
Sample: https://www.hybrid-analysis.com/sample/3fb2e50764dea9266ca8c20681a0e0bf60feaa34a52699cf2cf0c07d96a22553?environmentId=100
Article: https://blog.gdatasoftware.com/2017/01/29442-spora-worm-and-ransomware
Sites to get malware samples (free registration):
kernelmode.info
Virusshare.com
hybrid-analysis.com
malwr.com
2017-02-12 14:05:30
source
Gloss