{"id":1428,"date":"2022-02-28T14:00:39","date_gmt":"2022-02-28T13:00:39","guid":{"rendered":"https:\/\/cyber-detect.com\/?p=1428"},"modified":"2022-02-28T14:00:41","modified_gmt":"2022-02-28T13:00:41","slug":"morphological-analysis-to-identify-the-invisible-variant-of-emotet","status":"publish","type":"post","link":"https:\/\/cyber-detect.com\/en\/morphological-analysis-to-identify-the-invisible-variant-of-emotet\/","title":{"rendered":"Morphological Analysis to identify the invisible variant of EMOTET"},"content":{"rendered":"<div class=\"container\"><div class=\"row\"><div class=\"medium-large-full\">\n<div style=\"height:100px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n<\/div><\/div><\/div>\n\n<div class=\"container\"><div class=\"row\"><div class=\"medium-large-full\">\n<p>Emotet is a banking virus that has been rampant since 2014 and is one of the most costly according to the U.S. Department of Homeland Security on par with Ryuk or TrickBot malware. Present in an email or in a booby-trapped link, Emotet sneaks into fake invoices, shipping notices or even health information linked to covid-19.<\/p>\n<\/div><\/div><\/div>\n\n<div class=\"container\"><div class=\"row\"><div class=\"medium-large-full\">\n<p>The Emotet Trojan is a dropper. After infection, a dropper has the function of installing the payload. Thus, the Emotet dropper can install other ransomware and completely infect an endpointy.&nbsp;<\/p>\n<\/div><\/div><\/div>\n\n<div class=\"container\"><div class=\"row\"><div class=\"medium-large-full\">\n<p>New variants of the Trojan are constantly being identified, which makes it even more difficult for the majority of antivirus software on the market to detect.<\/p>\n<\/div><\/div><\/div>\n\n<div class=\"container\"><div class=\"row\"><div class=\"medium-large-full\">\n<p>On September 7, the ANSSI published an alert on the Emotet virus because its damage, in France and in the world, had already reached more than one million dollars.&nbsp;<\/p>\n<\/div><\/div><\/div>\n\n<div class=\"container\"><div class=\"row\"><div class=\"medium-large-full\">\n<p>In October 2020, only seven out of sixty-two anti-viruses were able to identify the present malicious code.<\/p>\n<\/div><\/div><\/div>\n\n<div class=\"container\"><div class=\"row\"><div class=\"medium-large-full\">\n<p>On January 18, 2021, a new variant of the Trojan was submitted to the VirusTotal site, which aggregates 68 antivirus programs. However, only 33 of them, or less than half, detected this variant. The detection of Emotet is crucial, as it signals the beginnings of an attack with serious consequences, and this detection must happen as soon as possible.&nbsp;<\/p>\n<\/div><\/div><\/div>\n\n<div class=\"container\"><div class=\"row\"><div class=\"medium-large-full\">\n<p>Why do variants of the Emotet dropper escape antivirus software? Even those based on artificial intelligence techniques, while Emotet has been around for several years? The reason is that each variant incorporates a new camouflage of the dropper and in the case of this Emotet variant, the original program is hidden in free code. As a result, a majority of antivirus programs are fooled.<\/p>\n<\/div><\/div><\/div>\n\n<div class=\"container\"><div class=\"row\"><div class=\"medium-large-full\">\n<p>&nbsp;<\/p>\n<\/div><\/div><\/div>\n\n<div class=\"container\"><div class=\"row\"><div class=\"medium-large-full\">\n<h2 class=\"wp-block-heading\">How to detect this variant ?<\/h2>\n<\/div><\/div><\/div>\n\n<div class=\"container\"><div class=\"row\"><div class=\"medium-large-full\">\n<p>Despite the effectiveness of antivirus software, it is advisable to use a complementary solution that detects, classifies and analyzes variants of known malicious code, but also unknown threats. The answer lies in morphological analysis. This method allows to gather and link known and unknown malicious behaviors in order to assemble, in less than a second, all the pieces of the puzzle. In order to avoid &#8220;false positives&#8221;, morphological analysis will exhibit similar behavior already identified in known malicious code and thus infer that the correlation of behavior can lead to a malicious action. The best morphological analysis solutions offer the possibility to manually verify the system analysis. In the case of the Emotet variant, the variant was camouflaged in the free software Clipping Regions , and the code portion in this Emotet variant from memory address 0x10002365 contains the real Emotet execution code.&nbsp;<\/p>\n<\/div><\/div><\/div>\n\n<div class=\"container\"><div class=\"row\"><div class=\"medium-large-full\">\n<p><\/p>\n<\/div><\/div><\/div>\n\n<div class=\"container\"><div class=\"row\"><div class=\"medium-large-full\">\n<p><\/p>\n<\/div><\/div><\/div>\n\n<div class=\"container\"><div class=\"row\"><div class=\"medium-large-full\">\n<h2 class=\"wp-block-heading\">Demonstration in pictures:<\/h2>\n<\/div><\/div><\/div>\n\n<div class=\"container\"><div class=\"row\"><div class=\"medium-large-full\">\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"945\" height=\"414\" src=\"https:\/\/cyber-detect.com\/wp-content\/uploads\/2021\/11\/1.png\" alt=\"\" class=\"wp-image-927\" srcset=\"https:\/\/cyber-detect.com\/wp-content\/uploads\/2021\/11\/1.png 945w, https:\/\/cyber-detect.com\/wp-content\/uploads\/2021\/11\/1-300x131.png 300w, https:\/\/cyber-detect.com\/wp-content\/uploads\/2021\/11\/1-768x336.png 768w\" sizes=\"auto, (max-width: 945px) 100vw, 945px\" \/><\/figure>\n<\/div><\/div><\/div>\n\n<div class=\"container\"><div class=\"row\"><div class=\"medium-large-full\">\n<p><\/p>\n<\/div><\/div><\/div>\n\n<div class=\"container\"><div class=\"row\"><div class=\"medium-large-full\">\n<p>By asking for more information, the morphological analysis specifies that this file has a malicious behavior and that this feature was already present in another malicious code whose MD5 is given.<\/p>\n<\/div><\/div><\/div>\n\n<div class=\"container\"><div class=\"row\"><div class=\"medium-large-full\">\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"945\" height=\"289\" src=\"https:\/\/cyber-detect.com\/wp-content\/uploads\/2021\/11\/2.png\" alt=\"\" class=\"wp-image-925\" srcset=\"https:\/\/cyber-detect.com\/wp-content\/uploads\/2021\/11\/2.png 945w, https:\/\/cyber-detect.com\/wp-content\/uploads\/2021\/11\/2-300x92.png 300w, https:\/\/cyber-detect.com\/wp-content\/uploads\/2021\/11\/2-768x235.png 768w\" sizes=\"auto, (max-width: 945px) 100vw, 945px\" \/><\/figure>\n<\/div><\/div><\/div>\n\n<div class=\"container\"><div class=\"row\"><div class=\"medium-large-full\">\n<p>Thus, the variant is correctly detected, outperforming the majority of the antiviruses present on the Virus Total site.&nbsp;<\/p>\n<\/div><\/div><\/div>\n\n<div class=\"container\"><div class=\"row\"><div class=\"medium-large-full\">\n<p><\/p>\n<\/div><\/div><\/div>\n\n<div class=\"container\"><div class=\"row\"><div class=\"medium-large-full\">\n<p><\/p>\n<\/div><\/div><\/div>\n\n<div class=\"container\"><div class=\"row\"><div class=\"medium-large-full\">\n<h2 class=\"wp-block-heading\">To go further:<\/h2>\n<\/div><\/div><\/div>\n\n<div class=\"container\"><div class=\"row\"><div class=\"medium-large-full\">\n<p>With new malware variants blooming faster than the buds in spring, it is now necessary to use morphological analysis to ensure effective protection against cyber attacks. Whether these attacks are sophisticated, targeted or simply not yet detected, the majority of antivirus solutions are not sufficient to defend against them. Indeed, although antivirus software covers 99.9% of current viruses, the remaining 0.01% are responsible for 95% of the damage caused by cyber attacks. Thanks to its sub-second response time, the exploration of malicious behavior contained in morphological analysis is an effective and rapid solution against unknown malware.<\/p>\n<\/div><\/div><\/div>\n\n<div class=\"container\"><div class=\"row\"><div class=\"medium-large-full\">\n<p><\/p>\n<\/div><\/div><\/div>\n\n<div class=\"container\"><div class=\"row\"><div class=\"medium-large-full\">\n<p><\/p>\n<\/div><\/div><\/div>\n\n<div class=\"container\"><div class=\"row\"><div class=\"medium-large-full\">\n<h2 class=\"wp-block-heading\">Contact us :<\/h2>\n<\/div><\/div><\/div>\n\n<div class=\"container\"><div class=\"row\"><div class=\"medium-large-full\">\n<p>The Cyber-Detect R&amp;D team at the origin of the morphological analysis solutions answers your questions:&nbsp;<a href=\"mailto:contact@cyber-detect.com\" target=\"_blank\" rel=\"noreferrer noopener\">contact@cyber-detect.com<\/a><\/p>\n<\/div><\/div><\/div>\n\n<div class=\"container\"><div class=\"row\"><div class=\"medium-large-full\">\n<div style=\"height:100px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n<\/div><\/div><\/div>","protected":false},"excerpt":{"rendered":"<p>Emotet is a banking virus that has been rampant since 2014 and is one of the most costly according to the U.S. Department of Homeland Security on par with Ryuk or TrickBot malware. Present in an email or in a booby-trapped link, Emotet sneaks into fake invoices, shipping notices or even health information linked to [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":70,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[13],"tags":[],"class_list":["post-1428","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-actualites-en"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v24.7 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Morphological Analysis to identify the invisible variant of EMOTET - Cyber-Detect<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/cyber-detect.com\/en\/morphological-analysis-to-identify-the-invisible-variant-of-emotet\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Morphological Analysis to identify the invisible variant of EMOTET - Cyber-Detect\" \/>\n<meta property=\"og:description\" content=\"Emotet is a banking virus that has been rampant since 2014 and is one of the most costly according to the U.S. Department of Homeland Security on par with Ryuk or TrickBot malware. Present in an email or in a booby-trapped link, Emotet sneaks into fake invoices, shipping notices or even health information linked to [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/cyber-detect.com\/en\/morphological-analysis-to-identify-the-invisible-variant-of-emotet\/\" \/>\n<meta property=\"og:site_name\" content=\"Cyber-Detect\" \/>\n<meta property=\"article:published_time\" content=\"2022-02-28T13:00:39+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-02-28T13:00:41+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/cyber-detect.com\/wp-content\/uploads\/2021\/08\/hizir-kaya-ExxuYNsViC4-unsplash-scaled.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1707\" \/>\n\t<meta property=\"og:image:height\" content=\"2560\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"adminbilliotte\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"adminbilliotte\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/cyber-detect.com\/en\/morphological-analysis-to-identify-the-invisible-variant-of-emotet\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/cyber-detect.com\/en\/morphological-analysis-to-identify-the-invisible-variant-of-emotet\/\"},\"author\":{\"name\":\"adminbilliotte\",\"@id\":\"https:\/\/cyber-detect.com\/en\/#\/schema\/person\/9bc85be73e00a52bbc3294f538e0ae47\"},\"headline\":\"Morphological Analysis to identify the invisible variant of EMOTET\",\"datePublished\":\"2022-02-28T13:00:39+00:00\",\"dateModified\":\"2022-02-28T13:00:41+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/cyber-detect.com\/en\/morphological-analysis-to-identify-the-invisible-variant-of-emotet\/\"},\"wordCount\":608,\"publisher\":{\"@id\":\"https:\/\/cyber-detect.com\/en\/#organization\"},\"image\":{\"@id\":\"https:\/\/cyber-detect.com\/en\/morphological-analysis-to-identify-the-invisible-variant-of-emotet\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/cyber-detect.com\/wp-content\/uploads\/2021\/08\/hizir-kaya-ExxuYNsViC4-unsplash-scaled.jpg\",\"articleSection\":[\"Actualit\u00e9s\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/cyber-detect.com\/en\/morphological-analysis-to-identify-the-invisible-variant-of-emotet\/\",\"url\":\"https:\/\/cyber-detect.com\/en\/morphological-analysis-to-identify-the-invisible-variant-of-emotet\/\",\"name\":\"Morphological Analysis to identify the invisible variant of EMOTET - Cyber-Detect\",\"isPartOf\":{\"@id\":\"https:\/\/cyber-detect.com\/en\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/cyber-detect.com\/en\/morphological-analysis-to-identify-the-invisible-variant-of-emotet\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/cyber-detect.com\/en\/morphological-analysis-to-identify-the-invisible-variant-of-emotet\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/cyber-detect.com\/wp-content\/uploads\/2021\/08\/hizir-kaya-ExxuYNsViC4-unsplash-scaled.jpg\",\"datePublished\":\"2022-02-28T13:00:39+00:00\",\"dateModified\":\"2022-02-28T13:00:41+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/cyber-detect.com\/en\/morphological-analysis-to-identify-the-invisible-variant-of-emotet\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/cyber-detect.com\/en\/morphological-analysis-to-identify-the-invisible-variant-of-emotet\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/cyber-detect.com\/en\/morphological-analysis-to-identify-the-invisible-variant-of-emotet\/#primaryimage\",\"url\":\"https:\/\/cyber-detect.com\/wp-content\/uploads\/2021\/08\/hizir-kaya-ExxuYNsViC4-unsplash-scaled.jpg\",\"contentUrl\":\"https:\/\/cyber-detect.com\/wp-content\/uploads\/2021\/08\/hizir-kaya-ExxuYNsViC4-unsplash-scaled.jpg\",\"width\":1707,\"height\":2560},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/cyber-detect.com\/en\/morphological-analysis-to-identify-the-invisible-variant-of-emotet\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/cyber-detect.com\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Morphological Analysis to identify the invisible variant of EMOTET\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/cyber-detect.com\/en\/#website\",\"url\":\"https:\/\/cyber-detect.com\/en\/\",\"name\":\"Cyber-Detect\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/cyber-detect.com\/en\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/cyber-detect.com\/en\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/cyber-detect.com\/en\/#organization\",\"name\":\"Cyber-Detect\",\"url\":\"https:\/\/cyber-detect.com\/en\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/cyber-detect.com\/en\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/cyber-detect.com\/wp-content\/uploads\/2021\/08\/AI-CYBER-DETECT-MORPHOLOGICAL-ANALYSIS-PAYSAGE-RGB-white-vecto.svg\",\"contentUrl\":\"https:\/\/cyber-detect.com\/wp-content\/uploads\/2021\/08\/AI-CYBER-DETECT-MORPHOLOGICAL-ANALYSIS-PAYSAGE-RGB-white-vecto.svg\",\"width\":728,\"height\":242,\"caption\":\"Cyber-Detect\"},\"image\":{\"@id\":\"https:\/\/cyber-detect.com\/en\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/cyber-detect.com\/en\/#\/schema\/person\/9bc85be73e00a52bbc3294f538e0ae47\",\"name\":\"adminbilliotte\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/cyber-detect.com\/en\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/e8ef84d61786269a92f9010e4333520a29594c88cc4f2c10f2805d592432d683?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/e8ef84d61786269a92f9010e4333520a29594c88cc4f2c10f2805d592432d683?s=96&d=mm&r=g\",\"caption\":\"adminbilliotte\"},\"url\":\"https:\/\/cyber-detect.com\/en\/author\/adminbilliotte\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Morphological Analysis to identify the invisible variant of EMOTET - Cyber-Detect","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/cyber-detect.com\/en\/morphological-analysis-to-identify-the-invisible-variant-of-emotet\/","og_locale":"en_US","og_type":"article","og_title":"Morphological Analysis to identify the invisible variant of EMOTET - Cyber-Detect","og_description":"Emotet is a banking virus that has been rampant since 2014 and is one of the most costly according to the U.S. Department of Homeland Security on par with Ryuk or TrickBot malware. Present in an email or in a booby-trapped link, Emotet sneaks into fake invoices, shipping notices or even health information linked to [&hellip;]","og_url":"https:\/\/cyber-detect.com\/en\/morphological-analysis-to-identify-the-invisible-variant-of-emotet\/","og_site_name":"Cyber-Detect","article_published_time":"2022-02-28T13:00:39+00:00","article_modified_time":"2022-02-28T13:00:41+00:00","og_image":[{"width":1707,"height":2560,"url":"https:\/\/cyber-detect.com\/wp-content\/uploads\/2021\/08\/hizir-kaya-ExxuYNsViC4-unsplash-scaled.jpg","type":"image\/jpeg"}],"author":"adminbilliotte","twitter_card":"summary_large_image","twitter_misc":{"Written by":"adminbilliotte","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/cyber-detect.com\/en\/morphological-analysis-to-identify-the-invisible-variant-of-emotet\/#article","isPartOf":{"@id":"https:\/\/cyber-detect.com\/en\/morphological-analysis-to-identify-the-invisible-variant-of-emotet\/"},"author":{"name":"adminbilliotte","@id":"https:\/\/cyber-detect.com\/en\/#\/schema\/person\/9bc85be73e00a52bbc3294f538e0ae47"},"headline":"Morphological Analysis to identify the invisible variant of EMOTET","datePublished":"2022-02-28T13:00:39+00:00","dateModified":"2022-02-28T13:00:41+00:00","mainEntityOfPage":{"@id":"https:\/\/cyber-detect.com\/en\/morphological-analysis-to-identify-the-invisible-variant-of-emotet\/"},"wordCount":608,"publisher":{"@id":"https:\/\/cyber-detect.com\/en\/#organization"},"image":{"@id":"https:\/\/cyber-detect.com\/en\/morphological-analysis-to-identify-the-invisible-variant-of-emotet\/#primaryimage"},"thumbnailUrl":"https:\/\/cyber-detect.com\/wp-content\/uploads\/2021\/08\/hizir-kaya-ExxuYNsViC4-unsplash-scaled.jpg","articleSection":["Actualit\u00e9s"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/cyber-detect.com\/en\/morphological-analysis-to-identify-the-invisible-variant-of-emotet\/","url":"https:\/\/cyber-detect.com\/en\/morphological-analysis-to-identify-the-invisible-variant-of-emotet\/","name":"Morphological Analysis to identify the invisible variant of EMOTET - Cyber-Detect","isPartOf":{"@id":"https:\/\/cyber-detect.com\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/cyber-detect.com\/en\/morphological-analysis-to-identify-the-invisible-variant-of-emotet\/#primaryimage"},"image":{"@id":"https:\/\/cyber-detect.com\/en\/morphological-analysis-to-identify-the-invisible-variant-of-emotet\/#primaryimage"},"thumbnailUrl":"https:\/\/cyber-detect.com\/wp-content\/uploads\/2021\/08\/hizir-kaya-ExxuYNsViC4-unsplash-scaled.jpg","datePublished":"2022-02-28T13:00:39+00:00","dateModified":"2022-02-28T13:00:41+00:00","breadcrumb":{"@id":"https:\/\/cyber-detect.com\/en\/morphological-analysis-to-identify-the-invisible-variant-of-emotet\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/cyber-detect.com\/en\/morphological-analysis-to-identify-the-invisible-variant-of-emotet\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/cyber-detect.com\/en\/morphological-analysis-to-identify-the-invisible-variant-of-emotet\/#primaryimage","url":"https:\/\/cyber-detect.com\/wp-content\/uploads\/2021\/08\/hizir-kaya-ExxuYNsViC4-unsplash-scaled.jpg","contentUrl":"https:\/\/cyber-detect.com\/wp-content\/uploads\/2021\/08\/hizir-kaya-ExxuYNsViC4-unsplash-scaled.jpg","width":1707,"height":2560},{"@type":"BreadcrumbList","@id":"https:\/\/cyber-detect.com\/en\/morphological-analysis-to-identify-the-invisible-variant-of-emotet\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/cyber-detect.com\/en\/"},{"@type":"ListItem","position":2,"name":"Morphological Analysis to identify the invisible variant of EMOTET"}]},{"@type":"WebSite","@id":"https:\/\/cyber-detect.com\/en\/#website","url":"https:\/\/cyber-detect.com\/en\/","name":"Cyber-Detect","description":"","publisher":{"@id":"https:\/\/cyber-detect.com\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/cyber-detect.com\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/cyber-detect.com\/en\/#organization","name":"Cyber-Detect","url":"https:\/\/cyber-detect.com\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/cyber-detect.com\/en\/#\/schema\/logo\/image\/","url":"https:\/\/cyber-detect.com\/wp-content\/uploads\/2021\/08\/AI-CYBER-DETECT-MORPHOLOGICAL-ANALYSIS-PAYSAGE-RGB-white-vecto.svg","contentUrl":"https:\/\/cyber-detect.com\/wp-content\/uploads\/2021\/08\/AI-CYBER-DETECT-MORPHOLOGICAL-ANALYSIS-PAYSAGE-RGB-white-vecto.svg","width":728,"height":242,"caption":"Cyber-Detect"},"image":{"@id":"https:\/\/cyber-detect.com\/en\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/cyber-detect.com\/en\/#\/schema\/person\/9bc85be73e00a52bbc3294f538e0ae47","name":"adminbilliotte","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/cyber-detect.com\/en\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/e8ef84d61786269a92f9010e4333520a29594c88cc4f2c10f2805d592432d683?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/e8ef84d61786269a92f9010e4333520a29594c88cc4f2c10f2805d592432d683?s=96&d=mm&r=g","caption":"adminbilliotte"},"url":"https:\/\/cyber-detect.com\/en\/author\/adminbilliotte\/"}]}},"_links":{"self":[{"href":"https:\/\/cyber-detect.com\/en\/wp-json\/wp\/v2\/posts\/1428","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cyber-detect.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cyber-detect.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cyber-detect.com\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/cyber-detect.com\/en\/wp-json\/wp\/v2\/comments?post=1428"}],"version-history":[{"count":3,"href":"https:\/\/cyber-detect.com\/en\/wp-json\/wp\/v2\/posts\/1428\/revisions"}],"predecessor-version":[{"id":1432,"href":"https:\/\/cyber-detect.com\/en\/wp-json\/wp\/v2\/posts\/1428\/revisions\/1432"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cyber-detect.com\/en\/wp-json\/wp\/v2\/media\/70"}],"wp:attachment":[{"href":"https:\/\/cyber-detect.com\/en\/wp-json\/wp\/v2\/media?parent=1428"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cyber-detect.com\/en\/wp-json\/wp\/v2\/categories?post=1428"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cyber-detect.com\/en\/wp-json\/wp\/v2\/tags?post=1428"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}