Ezuri: Regenerating a different kind of target. [Research Saturday] - podcast episode cover

Ezuri: Regenerating a different kind of target. [Research Saturday]

Apr 03, 202119 minSeason 3Ep. 177
--:--
--:--
Listen in podcast apps:
Metacast
Spotify
Youtube
RSS

Episode description

Guests Fernando Martinez and Tom Hegel from AT&T Alien Labs join Dave to discuss their team's research "Malware using new Ezuri memory loader." Multiple threat actors have recently started using a Go language (Golang) tool to act as a packer and avoid Antivirus detection. Additionally, the Ezuri memory loader tool acts as a malware loader and executes its payload in memory, without writing the file to disk. While this technique is known and commonly used by Windows malware, it is less popular in Linux environments. The research can be found here: Malware using new Ezuri memory loader Learn more about your ad choices. Visit megaphone.fm/adchoices
For the best experience, listen in Metacast app for iOS or Android
Open in Metacast
Ezuri: Regenerating a different kind of target. [Research Saturday] | CyberWire Daily podcast - Listen or read transcript on Metacast