H1N1: Technical analysis reveals new capabilities – part 2
By Josh Reynolds This is the second blog in a 3 part series that provides an in-depth technical analysis on the H1N1 malware. You can read the first entry here where I covered the evolution of H1N1, its infection vector and obfuscation techniques. This blog will provide an overview of its execution. H1N1 Execution Execution flow is broken down […]
Source:: Cisco Security Notice