
In this video from our Reverse Engineering with Ghidra online course you will see how a behavioral analysis of a malware is performed. The malicious sample in this exercise utilizes a technique called process hollowing, making it even more interesting. Dive in!
well done