Yassin Said Esteller
Something new has arrived at Panda's laboratory. The talk will show how a Panda malware analyst is responsible for studying the case and hunting the threat. The task is to study the sample received and extract the maximum information. Studying the input vector matches are found in the cases reviewed. Similarly, the malicious file is subject to study by reverse engineering techniques. The different methods and techniques used by the malware will be explained and will show how to identify the campaign and the actors, finally defining the authors.