How to Hunt for Ransomware Variants in Your Malware Lab

Data Exfiltration Examples to Detect Extortion Threats


During this webinar, Rob Simmons, Independent Malware & Threat Researcher at ReversingLab, will analyze a ransomware sample that performs data exfiltration in his malware lab. Rob will show how the malware uploads a set of files from the victim's computer to command and control servers, how to identify anti-analysis behavior, and then how to hunt for related variants of the same malware.

Watch the Webinar