When performing malware analysis one of the techniques the bad guys uses to hide their code is obfuscation.
What this means is that the program is hidden or obscured to make malware analysis much more difficult. You didn’t think they would make it easy on you did they?
It shows you one method (the Tom Liston Method) on how to take obfuscated code that looks like this (click image to enlarge):
Excellent article, check it out!
Cross-posted from Cyber Arms