Your lab session has been automatically terminated due to the expiration of your allocated time.
What is the md5 hash of the file?
What is the value of entropy?
What is the number of sections?
What is the entropy of the .text section?
What is the name of the technique used to obfuscate string?
What is the API that used malware allocated memory to write shellcode?
What is the protection of allocated memory?
What assembly instruction is used to transfer execution to the shellcode?
What is the number of functions the malware resolves from kernel32?
The malware obfuscates two strings after calling RegisterClassExA. What is the first string?
What is the value of dwCreationFlags of CreateProcessA?
Malware uses a process injection technique. What is the name of it?
What is the API used to write the payload into the target process?
After a successful breach, A SOC analyst found an executable, but they could not know what it does, so they sent it to you for further analysis.
610 days ago
5 days ago
Given the sheer volume of email requests, our team might take longer to get back to you. Want a quick answer? Post in our community where our team & members respond promptly!
Thank you for your understanding.