LummaC2: Obfuscation Through Indirect Control Flow | Google Cloud BlogAnalysis of malware samples using a technique to thwart all binary analysis tools, and hinder reverse engineering efforts.#obfuscation#evasive-malware·cloud.google.com·Sep 25, 2024LummaC2: Obfuscation Through Indirect Control Flow | Google Cloud Blog