Malware analysis

C Code in Assembly

Reverse engineering analysts have a good grasp of C code language and how it’s converted into assembly listings. C code was designed to function as a short f

Anti-disassembly, anti-debugging and anti-VM

Malware takes advantage of a disassembler’s basic assumptions. It exploits predictable choices made by debuggers and hides when it suspects it is running on

Reverse Engineering C++

Introduction C++ programming is popular among developers, owing to its advanced capabilities. Malware reverse engineering relies heavily on C++ to translate

Malware: What are Trojans?

Introduction The term “Trojan horse” is normally associated with the ancient Greek story of “The Iliad,” so why is there a type of malware called a Trojan ho

Common malware behavior

As malware threats continue to grow in both sophistication and frequency, it is increasingly critical for information security professionals to develop effec

OllyDbg

Introduction  OllyDbg is a 32-bit debugging tool used to analyze binary code. Its popularity is tied to the fact that people can do so despite not having ac

Types of rootkits

A rootkit is simply a set of tools that can maintain root privileged access to an operating system. A malware rootkit will usually carry a malicious code/sof

Rootkits 101

Introduction Rootkits are a species of malicious software with incredible damage potential. Due to their sophistication and complexity, they also present a c

Duqu 2.0: The most sophisticated malware ever seen [Updated 2019]

Disconcerting news is shocking the IT security industry. The virus protection giant Kaspersky has been compromised by a sophisticated cyber-threat. A new,

Analyzing packed malware

Malware is created with deception in mind. Malware authors want to go undetected in order to steal, alter or delete as much information as possible.  Obfu