Malware analysis

Petya Ransomware Initial Analysis

The document below is an initial level analysis of the recent Petya Ransomware (2017). We will also discuss an analysis of a dll variant of the ransomware.

Vault 7 Data Leak: Analyzing the CIA files

Digging the Vault 7 dumps In a first post on the Vault7 dump, we analyzed the information contained in files leaked by Wikileaks and allegedly originating fr

Which Malware are Specifically Designed to Target ISC Systems?

Introduction – ICS malware, a rarity in the threat landscape At the end of May, security experts discovered a seven-year-old remote code execution vulnerabil

More Bypassing of Malware Anti-Analysis Techniques

For last few articles, we have seen how malware employs some anti-analysis techniques and how we can bypass those techniques. Now, let's raise the bar a bit

SambaCry: Hundreds of thousands of Linux systems exposed to a campaign that delivers cryptocurrency miner

CVE-2017-7494 - A Samba seven-year-old remote code execution vulnerability At the end of May, security experts discovered a seven-year-old remote code execut

Malware Anti-Analysis Techniques-TLS and Process Hallowing

In continuation to previous articles, this article will also show a more sophisticated approach used by malware to thwart anti-analysis techniques. Let's sta

Judy Malware: Millions of Android Devices Potentially Exposed

It has happened again; security experts have discovered a malicious application inside the official Google Play store. The new malware, dubbed "Judy," is des

Malware-as-a-service

Section 1. Introduction In May 2017, a new form of ransomware called WannaCry affected more than 230,000 personal and business computers in over 150 countrie

A4 Black Friday: Massive Ransomware Attack Leveraging on Wannacry Hit Systems Worldwide

WannaCry ransomware hit Windows computers worldwide A massive malicious ransomware-based attack made the headlines on Friday, first targeting UK hospitals a

Malware Anti-Analysis and Bypassing its Techniques

In continuation to the previous article on how malware can evade normal detections and how analysts can bypass those techniques now let's look at some even m