Post

Deep Dive into a Dumped Malware without a PE Header

This analysis is part of an incident investigation led by the FortiGuard Incident Response Team.

We discovered malware that had been running on a compromised machine for several weeks. The threat actor had executed a batch of scripts and PowerShell to run the malware in a Windows process. Although obtaining the original malware executable was difficult, a memory dump of the running malware process and a full memory dump of the compromised machine (the “fullout” file, size 33GB) were successfully acquired.

To read the complete article see: https://www.fortinet.com/blog/threat-research/deep-dive-into-a-dumped-malware-without-a-pe-header

This post is licensed under CC BY 4.0 by the author.