Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

Sure. But that does not answer any questions about their tooling or methods. Considered a business secret? They present the readable C code of the binary payload like it has appeared just out of the blue.


They're using IDA Pro, with names that they presumably came up with themselves by analyzing what the code does.




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: