<description>&lt;div&gt;
&lt;p&gt;&lt;strong&gt;Can You Identify the Malware Family?&lt;br&gt;&lt;/strong&gt;&lt;br&gt;Out of the Woods: The Threat Hunting Podcast returns with another live, interactive edition designed to test how you analyze malicious activity. This session will focus on a specific &lt;strong&gt;malware family&lt;/strong&gt;, revealing its behavior in stages as our hosts walk through execution patterns, infrastructure clues, and operational tradecraft.&lt;/p&gt;&lt;p&gt;Participants will examine how observed behaviors align to MITRE ATT&amp;amp;CK, how the malware evolves across campaigns, and how delivery methods and post-exploitation activity signal attribution. Before the final reveal, attendees will have the opportunity to submit their best guess on which malware family is responsible.&lt;/p&gt;&lt;p&gt;&lt;strong&gt;What You’ll Learn:&lt;/strong&gt;&lt;/p&gt;&lt;/div&gt;&lt;ul&gt;
&lt;li&gt;Real-world malware behavior – A phase-by-phase breakdown of an active malware campaign&lt;/li&gt;
&lt;li&gt;MITRE ATT&amp;amp;CK in context – How techniques manifest during execution&lt;/li&gt;
&lt;li&gt;Behavioral fingerprinting – Identifying patterns across variants and infrastructure&lt;/li&gt;
&lt;li&gt;Delivery and objectives – What infection chains reveal about operator intent&lt;/li&gt;
&lt;li&gt;Interactive analysis – Submit your guess before the final reveal&lt;/li&gt;
&lt;/ul&gt;&lt;div&gt;
&lt;br&gt;Watch the episode here: &lt;a href="https://youtu.be/wo-Vy6okKVI%20"&gt;https://youtu.be/wo-Vy6okKVI &lt;/a&gt;
&lt;/div&gt;</description>

Out of the Woods: The Threat Hunting Podcast

Out of the Woods: The Threat Hunting Podcast

S3 Ep61: [LIVE] Guess Who: The Malware Edition

MAR 26, 202689 MIN
Out of the Woods: The Threat Hunting Podcast

S3 Ep61: [LIVE] Guess Who: The Malware Edition

MAR 26, 202689 MIN

Description

<div> <p><strong>Can You Identify the Malware Family?<br></strong><br>Out of the Woods: The Threat Hunting Podcast returns with another live, interactive edition designed to test how you analyze malicious activity. This session will focus on a specific <strong>malware family</strong>, revealing its behavior in stages as our hosts walk through execution patterns, infrastructure clues, and operational tradecraft.</p><p>Participants will examine how observed behaviors align to MITRE ATT&amp;CK, how the malware evolves across campaigns, and how delivery methods and post-exploitation activity signal attribution. Before the final reveal, attendees will have the opportunity to submit their best guess on which malware family is responsible.</p><p><strong>What You’ll Learn:</strong></p></div><ul> <li>Real-world malware behavior – A phase-by-phase breakdown of an active malware campaign</li> <li>MITRE ATT&amp;CK in context – How techniques manifest during execution</li> <li>Behavioral fingerprinting – Identifying patterns across variants and infrastructure</li> <li>Delivery and objectives – What infection chains reveal about operator intent</li> <li>Interactive analysis – Submit your guess before the final reveal</li> </ul><div> <br>Watch the episode here: <a href="https://youtu.be/wo-Vy6okKVI%20">https://youtu.be/wo-Vy6okKVI </a> </div>