Analysis of a spam bot

Binary starts fixing the API calls. After fixing up the imports, the Reg32 path is retrieved. Default heap is accessed, and Socket / MAC addresses are retrieved. The MAC address is not used in the c2 packet but is used in exception handler and exception data is sent to c2. Here in this subroutine, c2 […]
Hacking – InfoSec Resources