Skip to content

Commit e0e2337

Browse files
committed
fixed image
1 parent dacf3f3 commit e0e2337

1 file changed

Lines changed: 1 addition & 1 deletion

File tree

content/posts/unpackinglocky.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -156,7 +156,7 @@ Now that our breakpoints are set, we run the malware and hit our breakpoint. Aft
156156

157157
Loading the dumped binary on VT - and don't mind the name, I just tested it before making this post - we get a lot of hits marking it as malicious:
158158

159-
![](/posts/unpackinglocky/Scylla_dumped.png)
159+
![](/posts/unpackinglocky/scylla_dumped.png)
160160

161161
### Bonus
162162
Another technique that you can use is breakpointing at `popad` instruction. As you saw, the program breaks at EntryPoint at a `pushad` instruction.

0 commit comments

Comments
 (0)