Hi Peter, thanks for another great RE article. Would it be possible to obtain a copy of the infected machines memory image? Basically, I’m interested in reworking your work using volatility to see how the data “collection” process impacts the analysis workflow. Many thanks, Carl.
Hey Carl, The original machine was broken down already… In order to write the documentation, we used a VM with a bunch of tools… Snapshots were removed too 🙁 You can easily reproduce the issue by – running l.exe – hosting the image files yourself – do a little IP trick to make sure the public IP’s refer to your own webserver