Detailed Threat Analysis of Shamoon 2.0 Malware

[vc_row css=".vc_custom_1452687555475{margin-bottom: 100px !important;}"][vc_column offset="vc_col-lg-9 vc_col-md-9" css=".vc_custom_1452702342137{padding-right: 45px !important;}"][vc_custom_heading source="post_title" use_theme_fonts="yes" el_class="no_stripe"][stm_post_details][vc_column_text css=".vc_custom_1486648453783{margin-bottom: 20px !important;}" el_class="no_stripe"] Our Previous post talked about the initial overview of the Shamoon 2.0 sample. This analysis is a continuation of our last post but with…