Further reading
You can refer to the following links for more information on the topics covered in this chapter:
- During the analysis performed in this chapter, we didn't need to use all of Ghidra's features. Check out the following Ghidra cheat sheet for further details: https://ghidra-sre.org/CheatSheet.html
- Learning Malware Analysis, Monnappa K A, June 2018: https://www.packtpub.com/eu/networking-and-servers/learning-malware-analysis
- Alina, the latest POS malware – PandaLabs analysis: https://www.pandasecurity.com/en/mediacenter/pandalabs/alina-pos-malware/
- Fundamentals of Malware Analysis, Munir Njenga, March 2018 [Video]: https://www.packtpub.com/networking-and-servers/fundamentals-malware-analysis-video
- Hybrid analysis – analyze and detect known threats: https://www.hybrid-analysis.com/?lang=es