read time = 5 minutes Summary This is the third in a series of posts exploring fundamental malware analysis techniques. Please check out Part 1 and Part 2 for some additional background. The following techniques are presented as an alternative to automated sandboxing, which are effective and powerful tools. However, as we showed in Part…
![How To: Extract Network Indicators of Compromise (IOCs) from Maldoc Macros — Part 3](https://security-soup.net/wp-content/uploads/2019/02/Screen-Shot-2019-02-22-at-12.04.13-AM.png)