Analysis of the Inkasso Trojaner

In this report Curesec went further with the trojan analysis – how it operates, how it injects itself into strategic system points and what kind of anti-reversing and anti-debugging techniques it uses. In the next report Curesec will write more about the rootkit functionality.

Read more here – https://cureblog.de/2013/09/inkasso-trojaner-part-3/

About The Author

Leave a Comment

Your email address will not be published. Required fields are marked *

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Scroll to Top