Maik Romaikroservice.com·Mar 4, 2024Malware Analysis I - Detecting Indicators of Compromise and malicious InfrastructureToday we will see how we can identify malware urls / indicators of compromise from malware and the malware sample we will use is: https://bazaar.abuse.ch/sample/41f76926477c7f8759900567ced4e5e1f9057e40d2a151badc873d23f372997e/ Stage 1 - comprobante_s...Discuss·152 readshacking
Mohamed Kouroumamokourouma.hashnode.dev·Feb 16, 2024Analysing the Gootloader infection Palo-Alto threat intelligence using wireshark and performing dynamic analysissource: https://www.malware-traffic-analysis.net/2024/01/08/index.html In this analysis I will start with investigating the packet with wireshark and perform code analysis. Using some filters to make analysis much easier and efficient, individual pa...Discussmalware analysis
Damon Vesseydamonvessey.com·Feb 10, 2024Where Do I Even Begin to Learn Reverse Engineering?That's the million dollar question. My personal opinion, learning the C programming language would be an excellent place to start. There will be others that argue to learn python, but once you get into reverse engineering, you'll have to learn C anyw...DiscussFrom Beginner to Smashing the Stack for Fun and Profit and Beyondreverse engineering
Aljoscha Irmeraljoschairmer.hashnode.dev·Jan 16, 2024Deciphering the Hidden: The Role of AI in Unmasking Obfuscated MalwareIntroduction In the evolving landscape of cybersecurity, the threat of malware and viruses persists as a significant challenge. These malicious entities often employ obfuscated code - a method designed to mask their true purpose and make analysis dif...Discuss·36 readsObfuscated Code
Gunjan Mehtagunjanmehta01.hashnode.dev·Dec 13, 2023Day 9 of Advent of Cyber 2023!Back story: Forensic McBlue and his team found the deleted version of a malware that lets Tracy McGreedy control elves from a distance. Now, they're working to stop this mind control incident. Their plan is to get back at Tracy by examining the back-...Discussmalware analysis
Bishwajeet Biswasblog.ethernyte.com·Dec 1, 2023Unraveling the Intricacies of C# DLL Injection Malware: A Deep Dive into Malicious CodeIn the world of cybersecurity, every day is a battle against an evolving army of digital adversaries. Today, we're going to explore the thrilling, mysterious realm of C# DLL Malware. This journey will involve analyzing file hashes, decoding the secre...Discuss·106 reads#cybersecurity
Bishwajeet Biswasblog.ethernyte.com·Nov 24, 2023Excel Macros Unleashed: The Hidden Malware ThreatIn the realm of cybersecurity, the unassuming Excel spreadsheet has become a battleground for cybercriminals. Excel macro malware, the silent saboteurs, lurk within seemingly harmless files, waiting to strike. Let's embark on a quest to decode their ...Discuss·99 reads#cybersecurity
Mohamed Kouroumamokourouma.hashnode.dev·Nov 21, 2023HTTPS != SecurityNot because you use HTTPs means you are protected, TLS is implemented to attain confidentiality, non-repudiation, authentification and data integrity. Hackers also use it for the same reason. A packet analysis to demonstrate this using wireshark: 2 ...Discussmalware analysis
Mohamed Kouroumamokourouma.hashnode.dev·Nov 21, 2023Starting Malware AnalysisYou do not need to be an expert programmer to start analyzing malware, you just need to be driven by your curiosity. How to start ???? 1- You need a virtual environment Different virtualization technology exists, VMware and VirtualBox are recommended...Discussmalware analysis
BlueSide_StrongSideblog.onsec.tech·Nov 5, 2023I checked... nothing is THERE!DISCLAIMER: If you are planning to review any of the artifacts below, proceed with caution as the data is still active and of course, the malware actors could monitor connections to the IOCs. Table Setting I recently made a post on LinkedIn in regard...DiscussMalware