Malicious Process Environment Block Manipulation, (Fri, Jan 9th)

This post was originally published on this site

Reverse engineers must have a good understanding of the environment where malware are executed (read: the operating system). In a previous diary, I talked about malicious code that could be executed when loading a DLL[1]. Today, I’ll show you how a malware can hide suspicious information related to created processes.

Leave a Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.