Mobile Device Malware Analysis
Mobile devices present interesting challenges when it comes to:
- Incident Response
- Malware Analysis
- Digital Forensics
Mobile devices present interesting challenges when it comes to:
I’m totally in the middle of doing some work but this alert just came in so I have quickly dumped the data:
This came in via a Confluence exploit (not sure which CVE yet). I’ve not got time to analyse but thought I’d share this as an educational excercise for people! It’s a good excercise to see the apache tomcat logs and then decode, obtain samples and analyse the activity/imapct (as well as yoink IOCs etc.)
Read more “Learn to SOC: Cryptominer Analysis” →