16 min listen
Ezuri: Regenerating a different kind of target. [Research Saturday]
FromCyberWire Daily
ratings:
Length:
19 minutes
Released:
Apr 3, 2021
Format:
Podcast episode
Description
Guests Fernando Martinez and Tom Hegel from AT&T Alien Labs join Dave to discuss their team's research "Malware using new Ezuri memory loader." Multiple threat actors have recently started using a Go language (Golang) tool to act as a packer and avoid Antivirus detection. Additionally, the Ezuri memory loader tool acts as a malware loader and executes its payload in memory, without writing the file to disk. While this technique is known and commonly used by Windows malware, it is less popular in Linux environments.
The research can be found here:
Malware using new Ezuri memory loader
The research can be found here:
Malware using new Ezuri memory loader
Released:
Apr 3, 2021
Format:
Podcast episode
More Episodes from CyberWire Daily
Bonus Episode: 2024 Cybersecurity Canon Hall of Fame Inductee: Cybersecurity Myths and Misconceptions: Avoiding the Hazards and Pitfalls that Derail Us by Eugene Spafford, Leigh Metcalf, Josiah Dykstra and Illustrated by Pattie Spafford. [CSOP] by CyberWire Daily