Articles Blog | G5 Cyber Security

Research – Reversing Encrypted Callbacks And COM Interfaces

Whitepaper that discusses viruses that make use of COM interfaces to implement their functionality and how to reverse the binaries.

 

You can download it from the following link: https://packetstormsecurity.com/files/download/125082/reversing-callbacks.pdf

Source: https://packetstormsecurity.com/files/125082/Reversing-Encrypted-Callbacks-And-COM-Interfaces.html

Exit mobile version