Identifying Signs of Runtime-Linking and Building Context for API Hashes in Lockbit Malware - Part 3

Identifying Signs of Runtime-Linking and Building Context for API Hashes in Lockbit Malware - Part 3

Dr Josh Stroschein via YouTube Direct link

Another layer deeper

4 of 6

4 of 6

Another layer deeper

Class Central Classrooms beta

YouTube videos curated by Class Central.

Classroom Contents

Identifying Signs of Runtime-Linking and Building Context for API Hashes in Lockbit Malware - Part 3

Automatically move to the next video in the Classroom when playback concludes

  1. 1 Finding evidence of runtime linking
  2. 2 Precomputed hashes/checksums and what they are used for
  3. 3 Building context around how APIs will be imported
  4. 4 Another layer deeper
  5. 5 Using recursion to dynamically resolve APIs
  6. 6 Stepping through the code in a debugger

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.