FortiRusty Aug 24
In part I of this blog, the team demonstrated how to unpack the malware, hooking and process injection techniques used by IcedID, as well as how to execute the payload. Take a closer look at the core payload. Part II: