Sample
- SHA256
-
6d9c14a1fd30da25fc3fca59274c2898518159ba4a542b5255534a4a304519b1 - Difficulty
- easy
- Platform
- Windows
- Tags
- legion ransomnote
- Likes
- 0
- Views
- 8
- Submitter
- struppigel
Analysis
Goal
The ransom note is added here for illustrative purposes.
Description
Follow the videos in the course and learn how to find the location of encryption algorithms in ransomware and how to analyze them.
Recommended Tools
—
Comments
Please login to view and post comments.