Malware analysis: part 8. Yara rule example for MurmurHash2. MurmurHash2 in Conti ransomware 5 minute read ﷽
Malware development: persistence - part 21. Recycle Bin, My Documents COM extension handler. Simple C++ example. 3 minute read ﷽