{"guid":"54542122-4b90-5e8e-8e5c-fef908a50cd6","title":"Anatomie eines Malware-Droppers: Emotet in der Praxis","subtitle":null,"slug":"cpu19-20-anatomie-eines-malware-droppers-emotet-in-der-praxis","link":"https://pretalx.chaos-party-ulm.de/cpu19/talk/REXTBC","description":"","original_language":"deu","persons":["Jan"],"tags":["cpu19","20","cpu","Ulm","chaos","party"],"view_count":792,"promoted":false,"date":"2019-06-22T00:00:00.000+02:00","release_date":"2019-06-25T02:00:00.000+02:00","updated_at":"2026-03-21T02:45:03.966+01:00","length":3385,"duration":3385,"thumb_url":"https://static.media.ccc.de/media/events/cpu/2019/20-hd.jpg","poster_url":"https://static.media.ccc.de/media/events/cpu/2019/20-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/events/cpu/2019/20-hd.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/events/cpu/2019/20-hd.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/cpu19-20-anatomie-eines-malware-droppers-emotet-in-der-praxis","url":"https://api.media.ccc.de/public/events/54542122-4b90-5e8e-8e5c-fef908a50cd6","conference_title":"Chaos Party Ulm 2019","conference_url":"https://api.media.ccc.de/public/conferences/cpu19","related":[{"event_id":7208,"event_guid":"94e791fd-1e7a-5a08-b2dc-ee1dc99f6093","weight":24},{"event_id":7210,"event_guid":"fede50ab-1ec4-5977-966e-239e811cae65","weight":16},{"event_id":7211,"event_guid":"816f18a3-0868-5e45-ad35-e6d160ef9712","weight":22},{"event_id":7213,"event_guid":"3ad77889-fccb-55ca-a014-82551329c013","weight":18},{"event_id":7214,"event_guid":"13ce9b74-b473-5ac7-bc76-e4e120170448","weight":10},{"event_id":7215,"event_guid":"12f94fb4-9e79-549c-9fe1-7ea056dff46c","weight":18},{"event_id":7216,"event_guid":"e5ea4d79-bc98-58e3-80ef-e0e228d60164","weight":8},{"event_id":7231,"event_guid":"6e585f42-52f3-4015-8a7a-f2e204f7afe8","weight":10},{"event_id":7236,"event_guid":"e3bdda0e-c95f-4021-8500-3718a2913352","weight":8}],"recordings":[{"size":307,"length":3385,"mime_type":"video/mp4","language":"deu","filename":"cpu19-20-deu-Anatomie_eines_Malware-Droppers_Emotet_in_der_Praxis_hd.mp4","state":"new","folder":"h264-hd","high_quality":true,"width":1920,"height":1080,"updated_at":"2019-06-25T14:23:20.248+02:00","recording_url":"https://cdn.media.ccc.de/events/cpu/2019/h264-hd/cpu19-20-deu-Anatomie_eines_Malware-Droppers_Emotet_in_der_Praxis_hd.mp4","url":"https://api.media.ccc.de/public/recordings/36248","event_url":"https://api.media.ccc.de/public/events/54542122-4b90-5e8e-8e5c-fef908a50cd6","conference_url":"https://api.media.ccc.de/public/conferences/cpu19"},{"size":439,"length":3385,"mime_type":"video/webm","language":"deu","filename":"cpu19-20-deu-Anatomie_eines_Malware-Droppers_Emotet_in_der_Praxis_webm-hd.webm","state":"new","folder":"webm-hd","high_quality":true,"width":1920,"height":1080,"updated_at":"2019-06-25T14:47:46.128+02:00","recording_url":"https://cdn.media.ccc.de/events/cpu/2019/webm-hd/cpu19-20-deu-Anatomie_eines_Malware-Droppers_Emotet_in_der_Praxis_webm-hd.webm","url":"https://api.media.ccc.de/public/recordings/36268","event_url":"https://api.media.ccc.de/public/events/54542122-4b90-5e8e-8e5c-fef908a50cd6","conference_url":"https://api.media.ccc.de/public/conferences/cpu19"},{"size":30,"length":3385,"mime_type":"audio/opus","language":"deu","filename":"cpu19-20-deu-Anatomie_eines_Malware-Droppers_Emotet_in_der_Praxis_opus.opus","state":"new","folder":"opus","high_quality":false,"width":0,"height":0,"updated_at":"2019-06-25T14:48:04.528+02:00","recording_url":"https://cdn.media.ccc.de/events/cpu/2019/opus/cpu19-20-deu-Anatomie_eines_Malware-Droppers_Emotet_in_der_Praxis_opus.opus","url":"https://api.media.ccc.de/public/recordings/36269","event_url":"https://api.media.ccc.de/public/events/54542122-4b90-5e8e-8e5c-fef908a50cd6","conference_url":"https://api.media.ccc.de/public/conferences/cpu19"},{"size":108,"length":3385,"mime_type":"video/mp4","language":"deu","filename":"cpu19-20-deu-Anatomie_eines_Malware-Droppers_Emotet_in_der_Praxis_sd.mp4","state":"new","folder":"h264-sd","high_quality":false,"width":720,"height":576,"updated_at":"2019-06-25T14:48:38.290+02:00","recording_url":"https://cdn.media.ccc.de/events/cpu/2019/h264-sd/cpu19-20-deu-Anatomie_eines_Malware-Droppers_Emotet_in_der_Praxis_sd.mp4","url":"https://api.media.ccc.de/public/recordings/36270","event_url":"https://api.media.ccc.de/public/events/54542122-4b90-5e8e-8e5c-fef908a50cd6","conference_url":"https://api.media.ccc.de/public/conferences/cpu19"},{"size":51,"length":3385,"mime_type":"audio/mpeg","language":"deu","filename":"cpu19-20-deu-Anatomie_eines_Malware-Droppers_Emotet_in_der_Praxis_mp3.mp3","state":"new","folder":"mp3","high_quality":false,"width":0,"height":0,"updated_at":"2019-06-25T14:49:04.450+02:00","recording_url":"https://cdn.media.ccc.de/events/cpu/2019/mp3/cpu19-20-deu-Anatomie_eines_Malware-Droppers_Emotet_in_der_Praxis_mp3.mp3","url":"https://api.media.ccc.de/public/recordings/36271","event_url":"https://api.media.ccc.de/public/events/54542122-4b90-5e8e-8e5c-fef908a50cd6","conference_url":"https://api.media.ccc.de/public/conferences/cpu19"},{"size":159,"length":3385,"mime_type":"video/webm","language":"deu","filename":"cpu19-20-deu-Anatomie_eines_Malware-Droppers_Emotet_in_der_Praxis_webm-sd.webm","state":"new","folder":"webm-sd","high_quality":false,"width":720,"height":576,"updated_at":"2019-06-25T14:49:37.776+02:00","recording_url":"https://cdn.media.ccc.de/events/cpu/2019/webm-sd/cpu19-20-deu-Anatomie_eines_Malware-Droppers_Emotet_in_der_Praxis_webm-sd.webm","url":"https://api.media.ccc.de/public/recordings/36272","event_url":"https://api.media.ccc.de/public/events/54542122-4b90-5e8e-8e5c-fef908a50cd6","conference_url":"https://api.media.ccc.de/public/conferences/cpu19"}]}