[QuickNote] Analysis of Pandora ransomware

FOREWORD: Pandora’s code looks very weird and obfuscate complicated, so this analysis does not cover all its functions. I’m not a crypto expert, so I won’t dive into Pandora’s function like generating encryption key, process of creating threads to do its main task of encrypting files, writing file footer,… During malware code analysis, I found […]

Article Link: [QuickNote] Analysis of Pandora ransomware | 0day in {REA_TEAM}