Skip to content
  • YouTube
  • TikTok
  • Twitter
  • Instagram

MalwareTech

Everything Cyber Security

  • Sponsors
  • Speaking
  • Content
    • Podcast
    • Challenges
  • Contact
Malware Analysis Reverse Engineering

Let’s Analyze: Dridex (Part 3)

May 10, 2016November 21, 2021

Sorry for the longer than expected delay, occasionally the Dridex group will take the servers offline during the weekend and resume normal operations on Monday;

Read More
Malware Analysis Reverse Engineering

Let’s Analyze: Dridex (Part 2)

April 19, 2016November 21, 2021

In the previous article we went over how to dump the names of the majority of functions dridex resolves dynamically to complicate analysis. Today we will

Read More
Malware Analysis Reverse Engineering

Let’s Analyze: Dridex (Part 1)

March 21, 2016November 21, 2021

Due to popular request I’m starting a new reverse engineering article series which will detail how I go about analyzing various samples, instead of just

Read More
Malware Analysis Threat Intelligence

DDoSing with Other People’s Botnets

March 15, 2016November 21, 2021

While I was reverse engineering ZeroAccess in order to write a monitoring system, I had an idea which would allow me to use ZeroAccess C&C

Read More
Malware Analysis Reverse Engineering Threat Intelligence

Necurs.P2P – A New Hybrid Peer-to-Peer Botnet

February 22, 2016November 21, 2021

Last week I received a tip about a sample displaying some indication that it could be peer-to-peer (a large amount of UDP traffic being sent to

Read More
Personal Stories

When Scriptkiddies Attack

February 16, 2016November 21, 2021

Usually I don’t blog about the hundreds of ridiculous or down right crazy emails I receive each year, but this exchange makes all the others

Read More
Opinions

Backdoored Ransomware for Educational Purposes

January 28, 2016July 4, 2019

Here is an interesting article I found this week, it’s about how A researcher released two pieces of ‘educational’ ransomware which were secretly backdoored in

Read More
Malware Analysis Threat Intelligence

Exploring Peer to Peer Botnets

January 11, 2016November 21, 2021

Peer to Peer and Everything In between Back in October I’d gotten bored of the endless stream of cryptolockers and PoS trojan, so decided to

Read More
Malware Analysis Reverse Engineering

Kelihos Analysis – Part 1

December 7, 2015November 21, 2021

In the recent years I’ve noticed a shift in the malware economy from botnets to ransomware, which is likely due to the AV industry employing

Read More
Uncategorized

Device Guard – The Beginning of the End for Malware?

September 16, 2015June 29, 2016

Finally I manage to put together a computer capable of running Device Guard and I’ve had a little bit of time to play around with

Read More

Posts navigation

Previous 1 … 3 4 5 … 11 Next

  • Twitter

  • Youtube

  • Twitch

  • Discord

  • Instagram

  • RSS
  • Donations




    Categories

    • For Beginners
    • Hacking
    • Malware Analysis
    • News
    • Opinions
    • Personal Stories
    • Reverse Engineering
    • Threat Intelligence
    • Uncategorized
    • Videos
    • Vulnerability Research
    Copyright MalwareTech 2022