6 min
Managed Detection and Response (MDR)
Uncooking Eggs: Manual Dridex Dropper Malicious Document Deobfuscation Methods
Learn how to analyze an obfuscated malicious document with a focus on basic static analysis.
6 min
We Don’t Want White Font: Office Macros, Evasion, and Malicious Self-Reference
We identified the use of a document that leverages malformed headers, white fonts, and embedded VBA macros that execute the document’s contents via WScript.