Obfuscation: The Abracadabra of Malware Authors

Shyam Sundar Ramaswami, Sreenidhi Ramadurgam, and Sneha Shekar
• 7 minute read
View blog >
In this blog post, we’re going to run through an analysis we did of a file that was hosted at a Dropbox shared link that turned out to use some pretty interesting techniques in order to hide the real intentions of the file.