{"type":"rich","version":"1.0","title":"[LIVE] Guess Who: The Malware Edition","description":"Can You Identify the Malware Family?\n\nOut of the Woods: The Threat Hunting Podcast returns with another live, interactive edition designed to test how you analyze malicious activity. This session will focus on a specific malware family, revealing its behavior in stages as our hosts walk through execution patterns, infrastructure clues, and operational tradecraft.\n\nParticipants will examine how observed behaviors align to MITRE ATT&CK, how the malware evolves across campaigns, and how delivery methods and post-exploitation activity signal attribution. Before the final reveal, attendees will have the opportunity to submit their best guess on which malware family is responsible.\n\nWhat You’ll Learn:\n\nReal-world malware behavior – A phase-by-phase breakdown of an active malware campaign\nMITRE ATT&CK in context – How techniques manifest during execution\nBehavioral fingerprinting – Identifying patterns across variants and infrastructure\nDelivery and objectives – What infection chains reveal about operator intent\nInteractive analysis – Submit your guess before the final reveal\n\nWatch the episode here: https://youtu.be/wo-Vy6okKVI  (https://youtu.be/wo-Vy6okKVI%20)","author_name":"Out of the Woods: The Threat Hunting Podcast","author_url":"https://audioboom.com/channels/5085184-out-of-the-woods-the-threat-hunting-podcast","provider_name":"Audioboom","provider_url":"https://audioboom.com","width":480,"height":95,"thumbnail_url":"https://audioboom.com/i/43549644/600x600/c","thumbnail_width":600,"thumbnail_height":600,"html":"<iframe width=\"100%\" height=\"95\" src=\"https://embeds.audioboom.com/posts/8878840/embed?v=202301\" style=\"background-color: transparent; display: block; padding: 0; width: 100%\" frameborder=\"0\" allowtransparency=\"allowtransparency\" scrolling=\"no\" title=\"Audioboom player\" allow=\"autoplay\" sandbox=\"allow-downloads allow-forms allow-popups allow-same-origin allow-scripts allow-storage-access-by-user-activation allow-top-navigation-by-user-activation\"></iframe>"}
