Section 5: Unraveling malware evasion: GuLoader and XMRig in focus

Welcome to a revealing exploration of malware evasion techniques through practical demonstrations. In this section, we dive deep into the intricate workings of malware, focusing on GuLoader and XMRig, two formidable adversaries known for their sophisticated evasion tactics.

By understanding the intricacies of GuLoader and XMRig, you’ll gain valuable insights into the evolving landscape of cybersecurity threats. Join us as we unveil the hidden layers of evasion techniques employed by these malware specimens.

Tech Insights Deep Dive of April:
Detection Strategies & Operational Excellence

join VMRay for two powerhouse webinars designed to sharpen your threat detection and response capabilities — featuring a special joint session with Red Canary:

Days
Hours
Minutes
Seconds

Exclusive session! See how VMRay and Red Canary combine forces to deliver faster, smarter threat detection — with live demos and real-world use cases!

Days
Hours
Minutes
Seconds

Learn how to cut phishing triage time with automated detonation and deep analysis — quickly uncover threats while improving response accuracy!