{"width":"100%","provider_url":"https://hatena.blog","height":"190","published":"2019-05-26 14:01:45","blog_url":"https://soji256.hatenablog.jp/","author_name":"soji256","version":"1.0","provider_name":"Hatena Blog","categories":["\ud83d\udd27\u89e3\u6790\u74b0\u5883\u69cb\u7bc9","CAPE"],"author_url":"https://blog.hatena.ne.jp/soji256/","blog_title":"setodaNote","image_url":"https://cdn-ak.f.st-hatena.com/images/fotolife/s/soji256/20190526/20190526111907.png","html":"<iframe src=\"https://hatenablog-parts.com/embed?url=https%3A%2F%2Fsoji256.hatenablog.jp%2Fentry%2F2019%2F05%2F26%2F140145\" title=\"CAPE \u74b0\u5883\u3092\u69cb\u7bc9\u3057\u3066 Emotet \u3092\u89e3\u6790\u3059\u308b - setodaNote\" class=\"embed-card embed-blogcard\" scrolling=\"no\" frameborder=\"0\" style=\"display: block; width: 100%; height: 190px; max-width: 500px; margin: 10px 0px;\"></iframe>","title":"CAPE \u74b0\u5883\u3092\u69cb\u7bc9\u3057\u3066 Emotet \u3092\u89e3\u6790\u3059\u308b","description":"2023-01-10 CAPE CAPE (Malware Configuration And Payload Extraction) \u306f 2016\u5e749\u6708\u9803\u306b github \u306b\u516c\u958b\u3055\u308c\u305f\u30de\u30eb\u30a6\u30a7\u30a2\u30b5\u30f3\u30c9\u30dc\u30c3\u30af\u30b9\u3067\u3059\u3002Cuckoo \uff08\u3088\u308a\u6b63\u78ba\u306b\u306f spender-sandbox\uff09\u3092\u30d9\u30fc\u30b9\u306b\u958b\u767a\u3055\u308c\u3066\u304a\u308a\u3001\u591a\u304f\u306e\u30de\u30eb\u30a6\u30a7\u30a2\u304b\u3089\u30da\u30a4\u30ed\u30fc\u30c9\u3084\u8a2d\u5b9a\u60c5\u5831\u3092\u81ea\u52d5\u7684\u306b\u62bd\u51fa\u3059\u308b\u3053\u3068\u304c\u3067\u304d\u307e\u3059\u3002 CAPE\uff08github\uff09 GitHub - ctxis/CAPE: Malware Configuration And Payload Extraction CAPE\uff08\u7121\u511f\u3067\u8a66\u305b\u308b\u30aa\u30f3\u30e9\u30a4\u30f3\u7248\uff09 https://cape\u2026","type":"rich","url":"https://soji256.hatenablog.jp/entry/2019/05/26/140145"}