Malicious Process Environment Block Manipulation, (Fri, Jan 9th)

Reverse engineers must have a good understanding of the environment where malware are executed (read: the operating system). In a previous diary, I talked about malicious code that could be executed when loading a DLL[1]. Today, I&#x27ll show you how a malware can hide suspicious information related to created processes.

This article has been indexed from SANS Internet Storm Center, InfoCON: green

Read the original article: