CIA AED Development Tradecraft DOs and DON'Ts : antiforensics | Torhoo darknet markets
Here is an interesting read that might you some idea about US Intelligence's tradecraft mindset on implant/malware development:
https://wikileaks.org/ciav7p1/cms/page_14587109.html
(S//NF) DO obfuscate or encrypt all strings and configuration data that directly relate to tool functionality. Consideration should be made to also only de-obfuscating strings in-memory at the moment the data is needed. When a previously de-obfuscated value is no longer needed, it should be wiped from memory.
(S//NF) String data and/or configuration data is very useful to analysts and reverse-engineers.
(S//NF) DO NOT decrypt or de-obfuscate all string data or configuration data immediately upon execution. (S//NF) Raises the difficulty for automated dynamic analysis of the binary to find sensitive data.
You need to know what malware you got first. Also many people buying guides have no idea wtf malware is in them dont hate on me but my guess is at least 50% of people who downloaded anything from the darknet are infected they dont understand the concept TAILS ALONE IS NOT ENOUGH do not run tails on any computer you use daily for real OPSEC install tails on a usb and never plug that usb back into any computer use only a laptop purchase one with no HD any dell with a side slide HD is good since you can remove the hard drive as easy as opening the cd-tray install xp pro on a NEW encrypted HD and put that in the laptop you use as a burner now you have xp on a removable HD so you can still use windows or Linux (if you choose a Linux distro to install on your HD) to update tails when the "manual updates" are released
yea i have used cubes i maybe mistaking this but wasnt cubes stated to maybe have a bug a while back then was patched? Again i may be mistaking cubes with something else