WhisperGate part 1
Intro I see WhisperGate wiper gained some attention and figured it would be nice to write a few words about it and how to analyze it. The malware is composed of several stages. Stage 1 and Stage 2 are delivered to the victim machine, and stage 2 will unravel into multiple other stages. In this […]