X32Dbg Download

broken image
broken image
broken image

Note that I have now added a second post c0vering analysis of the C2 server from this sample. In this write-up, I intentionally try to touch on as many concepts as possible in order to demonstrate practical applications and hopefully provide a better learning experience for the reader. Utilising manual analysis and semi-automated string decryption to extract C2 information and ultimately identify the malware. Deep-dive analysis of a packed Redline Stealer sample.

broken image