In this blog post we explore using Binary Ninja and emulation to address obfuscation implemented by an open source obfuscator named Garble that is used by red team operators and malware authors to inhibit reverse engineering efforts.
Throughout this blog post we provide Binary Ninja automation strategies for analyzing obfuscation techniques implemented by Qakbot.