EPISODE · Mar 12, 2026 · 19 MIN
Malware Analysis Using Artificial Intelligence and Deep Learning
from CyberSecurity Summary · host CyberSecurity Summary
Focusing on its unpacking process and reflective DLL loading techniques. Using tools like capa, IDA, and Hiew, researchers identified that the malware requires a specific command-line password to decrypt its malicious payload and initiate execution. The ransomware employs robust encryption standards, namely RSA-2048 and ChaCha, while actively terminating security and forensic processes to evade detection. Beyond its technical capabilities, the report highlights the group's extortion methods, which include a "Hall of Shame" website for leaking stolen data and a unique killswitch involving a specific Python file. Ultimately, the documentation underscores the malware’s sophisticated defense evasion and its operational similarities to the notorious Maze ransomware.You can listen and download our episodes for free on more than 10 different platforms:https://linktr.ee/cyber_security_summaryGet the Book now from Amazon:https://www.amazon.com/Malware-Analysis-Artificial-Intelligence-Learning-ebook/dp/B08R3BT6JH?&linkCode=ll2&tag=cvthunderx-20&linkId=fd4234a2f7165e5f9c5cf70efc8de149&language=en_US&ref_=as_li_ss_tlDiscover our free courses in tech and cybersecurity, Start learning today:https://linktr.ee/cybercode_academy
NOW PLAYING
Malware Analysis Using Artificial Intelligence and Deep Learning
No transcript for this episode yet
Similar Episodes
Apr 23, 2026 ·44m
Apr 6, 2026 ·33m
Mar 24, 2026 ·37m
Mar 9, 2026 ·41m
Feb 23, 2026 ·39m
Feb 9, 2026 ·36m