Nick Carr on X: "The FireEye Labs Obfuscated String Solver (#FLOSS) shows a single stackstring: "80.85.157[.]238" - try it yourself: https://t.co/CrOHwCCM3e When run dynamically, the encoded SCT drops and executes this binary,
Reverse Engineering Tips] — Strings Deobfuscation with FLOSS | by Thomas Roccia | SecurityBreak
Evade Strings Detection with Stack Based – Cyber Security Architect | Red/Blue Teaming | Exploit/Malware Analysis
Basic Static Malware Analysis. Hello guys! Today I have something… | by Martin Martinez | Medium
7 open-source malware analysis tools you should try out - Help Net Security
Day 21: FireEye Labs Obfuscated String Solver (FLOSS) - CinCan
Malware Triage with FLOSS: API Calls Based Behavior - SANS Internet Storm Center
FLOSS Every Day: Automatically Extracting Obfuscated Strings from Malware- SANS DFIR Summit 2016 - YouTube
Malware Triage with FLOSS: API Calls Based Behavior - SANS Internet Storm Center