SX 3rd Meetup – Hunting Ghost RAT Using Memory Forensics

In this awesome presentation, Monnappa KA explained the details of Ghost RAT malware used in various Cyber Espionage attacks. He showcased the sandbox analysis, traffic pattern and decrypting the communications of Ghost RAT from packet capture. He also demonstrated both manual and automated method of detecting and decrypting the communications of Ghost RAT using memory forensics.

 

Presentation:

 

 

Video Demo 1:

 

 

Video Demo 2:

 

 

Video Demo 3:

 

Similar posts

No Comments Yet

Leave a Reply

Your email address will not be published. Required fields are marked *

site social