https://github.com/cocomelonc/2023-01-27-malware-analysis-7
Malware analysis part 7. YARA rule for CRC32 hash. Simple implementation of part of the REvil ransomware's logic
https://github.com/cocomelonc/2023-01-27-malware-analysis-7
Last synced: 22 days ago
JSON representation
Malware analysis part 7. YARA rule for CRC32 hash. Simple implementation of part of the REvil ransomware's logic
- Host: GitHub
- URL: https://github.com/cocomelonc/2023-01-27-malware-analysis-7
- Owner: cocomelonc
- Created: 2023-02-03T03:32:40.000Z (about 2 years ago)
- Default Branch: master
- Last Pushed: 2023-02-03T09:25:43.000Z (about 2 years ago)
- Last Synced: 2025-04-11T03:53:01.852Z (22 days ago)
- Language: C++
- Size: 23.4 KB
- Stars: 5
- Watchers: 2
- Forks: 2
- Open Issues: 0
-
Metadata Files:
- Readme: README.md
Awesome Lists containing this project
README
# Malware analysis: part 7. Yara rule for CRC32.
Malware analysis: part 7. Hash WinAPI function names via CRC32. C++ malware implementation example. CRC32 in REvil ransomware
[https://cocomelonc.github.io/malware/2023/02/02/malware-analysis-7.html](https://cocomelonc.github.io/malware/2023/02/02/malware-analysis-7.html)