Open in app
Home
Notifications
Lists
Stories

Write
Adam Munger
Adam Munger

Home

Published in The Startup

·Pinned

Static Analysis of the Emotet Malware

Step by Step Analysis of the Emotet.doc Macro / PowerShell Downloader Code — Figure 2 below shows the ANY.RUN process graph for the initial stages of the Emotet malware sample that we’re going to analyze. There is so much interesting code to get from first click to system compromise and I wanted to explore the process in a little more detail. …

11 min read

Static Analysis of the Emotet Malware
Static Analysis of the Emotet Malware

Published in The Startup

·Nov 12, 2020

How to Build a Computer Security Lab in VMWare Workstation Pro

When working with malware or other offensive cyber tools it’s very important to ensure that malware and other exploits don’t escape to… — When working with malware or other offensive cyber tools it’s very important to ensure that malware and other exploits don’t escape to your computer, network, or worse yet, onto the Internet. VMWare Workstation Pro has been my go to desktop virtualization platform for many years. It’s a mature, stable and…

Vmware

5 min read

How to Build a Computer Security Lab in VMWare Workstation Pro
How to Build a Computer Security Lab in VMWare Workstation Pro
Adam Munger

Adam Munger

Cyber Leader and Eternal Student

Help

Status

Writers

Blog

Careers

Privacy

Terms

About

Knowable