Our Previous post talked about the initial overview of the Shamoon 2.0 sample .This analysis is a continuation of our last post but with a more insight on the working and behavior of the malware. There are 3 components which are linked with one another which makeup Shamoon 2.0 single malware.
Article Link: http://www.securitynewspaper.com/2017/02/09/detailed-threat-analysis-shamoon-2-0-malware/