Malware Analysis - 3CX SmoothOperator with Binary Ninja

We analyze the trojanized that was used in the supply chain attack called SmoothOperator. Me mark up the decompiled code in Binary Ninja and decrypt the next stage. Buy me a coffee: me on Twitter: Tools:Binary Ninja: : Sysinternals: :ffmpeg: :
Back to Top