Colonelyobo_2022_nov-dec.zip -
: Documentation of how the malware attempts to bypass Personal Firewalls (PFW) or Host Intrusion Prevention Systems (HIPS).
: Executing the malware in a controlled sandbox (like Cuckoo or Any.Run) to monitor real-time file system changes, network traffic, and API calls. ColonelYobo_2022_Nov-Dec.zip
: Applying algorithms such as Random Forest or Gradient Boosting to classify malware types based on extracted features like file size or network connections. : Documentation of how the malware attempts to