Comment by JoachimS
4 months ago
Very impressive analysis!
Interesting that they go through all that work to protect against modern deobfuscation attacks and reversing - and then use RC4 and MD5. They may be ok in this context, but the choice is sort of odd.
No comments yet
Contribute on Hacker News ↗