Malware encryption processing

chicchi

Level 1
Thread author
Jul 23, 2017
9
27
26
japan
Hi, Although I am interested,
When malware performs encryption processing,
1. Communicate with C & C server
2. Encrypt the file

Do you know who is doing cryptographic processing elsewhere?
If I do not know I can only sleep a little.
 
  • Like
Reactions: Daljeet