This document summarizes a presentation by Marius Bucur and Ioan Iacob of CrowdStrike on finding malware through unique behaviors. It discusses how they hunt for malware using YARA rules and Overwatch patterns to find infection vectors. It provides examples of malware found, including a malicious document that drops signed Delphi malware using MSIExec, and WMI being abused to inject a .NET binary into a legitimate process. It also discusses analyzing process injection, callstacks, RPCs and other techniques through reverse engineering to attribute similar samples and develop detection rules. The document cautions that just because something is possible does not mean it is advisable, and provides an example of a potentially suspicious but ultimately legitimate PowerShell script.