Course 20 - Malware Analysis: Identifying and Defeating Code Obfuscation | Episode 5: Identifying and Analyzing Cryptography in Malware
This episode covers why malware uses cryptography and encoding, detailing common techniques like XOR, Base64, AES, and RC4. It explains identification methods such as entropy analysis and import inspection, and introduces analysis tools like PE Studio, IDA Pro, and dnSpy for…