Techniques to detect common encryption algorithms used by malware.
Dissecting a PowerShell Infection Chain That Culminates in STEALC V2
In-depth analysis of the infamous Vidar stealer malware