Automated Deobfuscation of Ploutus ATM Malware
Ploutus uses multiple obfuscation techniques, such as string encryption, function name obfuscation, methods proxying, control-flow-graph (CFG) obfuscation, and method encryption.
Ploutus uses multiple obfuscation techniques, such as string encryption, function name obfuscation, methods proxying, control-flow-graph (CFG) obfuscation, and method encryption.
Tags: ATMAutomatedDeobfuscationMalwarePloutus
by HakTechs · Published October 8, 2020
by HakTechs · Published February 4, 2021
by HakTechs · Published September 16, 2020 · Last modified September 17, 2020
Best Articles