Malware analysis

Reverse engineering packed malware

In this article, you’ll get a better understanding of what a packed executable is and how to analyze and unpack malware. Finally, you’ll get to know the top

Assembly Basics

Introduction This article gives details about assembly programming for the Intel 8086 microprocessor. It also presents very clear details by providing exampl

Vigilante Malware: Do We Need a Cyber Vigilante? [Updated 2019]

The Mystery Behind the Linux.Wifatch Malware Thousands of IoT devices across the world have been infected with a new strain of malware, but this hacking camp

Debugging for malware analysis

This article provides an overview of debugging and how to use some of the most commonly used debuggers. We will begin by discussing OllyDbg; using it, we wil

Disassembly 101

Introduction This article briefly explores topics connected to assembly basics, registers, operands, instructions, arithmetic instructions, logical instruct

Malware Analysis and Reverse Engineering

Introduction This article provides a high-level overview of malware analysis and reverse engineering. If you are planning to get started with malware analys

Ransomware analysis with Volatility

In this article, we’ll discuss the Volatility framework and how to perform analysis on ransomware using it. We’ll discuss various capabilities of the tool th

Virtual Machine Introspection in Malware Analysis – Use Case

To determine the behavior of a piece of malware, we will develop a script (based on LibVMI functions) that will allow us to trace the Kernel APIs executed by

CamuBot Banking Malware Stands out for Its Ability to Bypass Biometric Authentication

A few days ago, security experts from IBM X-Force spotted a new strain of malware, tracked under the name CamuBot and targeting Brazilian bank customers. The

Virtual Machine Introspection in Malware Analysis – LibVMI

In the last article in this series, we have seen what Virtual Machine Introspection is and how it works in general. Now, in this article, we'll see how we ca