Summary
In this chapter, you learned how to analyze malware using Ghidra. We analyzed Alina POS malware, which is rich in features, namely pipes, threads, the ring0
rootkit, shellcode injection, and memory-scrapping.
You have also learned how bad guys earn money every day with cybercriminal activities. In other words, you learned about carding skills.
In the next chapter of this book, we will cover scripting malware analysis to work faster and better when improving our analysis of Alina POS malware.