Malware analysis

Malware analysis
The document below is an initial level analysis of the recent Petya Ransomware (2017). We will also discuss an analysis of a dll variant of the ransomware.

July 26, 2017
Security Ninja
Malware analysis
Digging the Vault 7 dumps In a first post on the Vault7 dump, we analyzed the information contained in files leaked by Wikileaks and allegedly originating fr

July 20, 2017
Pierluigi Paganini
Malware analysis
Introduction – ICS malware, a rarity in the threat landscape At the end of May, security experts discovered a seven-year-old remote code execution vulnerabil

June 20, 2017
Pierluigi Paganini
Malware analysis
For last few articles, we have seen how malware employs some anti-analysis techniques and how we can bypass those techniques. Now, let's raise the bar a bit

June 13, 2017
Security Ninja
Malware analysis
CVE-2017-7494 - A Samba seven-year-old remote code execution vulnerability At the end of May, security experts discovered a seven-year-old remote code execut

June 12, 2017
Pierluigi Paganini
Malware analysis
In continuation to previous articles, this article will also show a more sophisticated approach used by malware to thwart anti-analysis techniques. Let's sta

June 07, 2017
Security Ninja
Malware analysis
It has happened again; security experts have discovered a malicious application inside the official Google Play store. The new malware, dubbed "Judy," is des

June 05, 2017
Pierluigi Paganini
Malware analysis
Section 1. Introduction In May 2017, a new form of ransomware called WannaCry affected more than 230,000 personal and business computers in over 150 countrie

June 05, 2017
Daniel Dimov
Malware analysis
WannaCry ransomware hit Windows computers worldwide A massive malicious ransomware-based attack made the headlines on Friday, first targeting UK hospitals a

May 15, 2017
Pierluigi Paganini
Malware analysis
In continuation to the previous article on how malware can evade normal detections and how analysts can bypass those techniques now let's look at some even m

May 11, 2017
Security Ninja- Exam Pass Guarantee
- Live expert instruction
- Hands-on labs
- CREA exam voucher
In this series
- How AsyncRAT is escaping security defenses
- Chrome extensions used to steal users' secrets
- Luna ransomware encrypts Windows, Linux and ESXi systems
- Bahamut Android malware and its new features
- LockBit 3.0 ransomware analysis
- AstraLocker releases the ransomware decryptors
- Analysis of Nokoyawa ransomware
- Goodwill ransomware group is propagating unusual demands to get the decryption key
- Dangerous IoT EnemyBot botnet is now attacking other targets
- Fileless malware uses event logger to hide malware
- Nerbian RAT Using COVID-19 templates
- Popular evasion techniques in the malware landscape
- Sunnyday ransomware analysis
- 9 online tools for malware analysis
- Blackguard malware analysis
- Behind Conti: Leaks reveal inner workings of ransomware group
- ZLoader: What it is, how it works and how to prevent it | Malware spotlight [2022 update]
- WhisperGate: A destructive malware to destroy Ukraine computer systems
- Electron Bot Malware is disseminated via Microsoft's Official Store and is capable of controlling social media apps
- SockDetour: the backdoor impacting U.S. defense contractors
- HermeticWiper malware used against Ukraine
- MyloBot 2022: A botnet that only sends extortion emails
- Mars Stealer malware analysis
- How to remove ransomware: Best free decryption tools and resources
- Purple Fox rootkit and how it has been disseminated in the wild
- Deadbolt ransomware: The real weapon against IoT devices
- Log4j - the remote code execution vulnerability that stopped the world
- Rook ransomware analysis
- Modus operandi of BlackByte ransomware
- Emotet malware returns
- Mekotio banker trojan returns with new TTP
- Android malware BrazKing returns
- Malware instrumentation with Frida
- Malware analysis arsenal: Top 15 tools
- Redline stealer malware: Full analysis
- A full analysis of the BlackMatter ransomware
- A full analysis of Horus Eyes RAT
- REvil ransomware: Lessons learned from a major supply chain attack
- Pingback malware: How it works and how to prevent it
- Android malware worm auto-spreads via WhatsApp messages
- Malware analysis: Ragnarok ransomware
- Taidoor malware: what it is, how it works and how to prevent it | malware spotlight
- SUNBURST backdoor malware: What it is, how it works, and how to prevent it | Malware spotlight
- ZHtrap botnet: How it works and how to prevent it
- DearCry ransomware: How it works and how to prevent it
- How criminals are using Windows Background Intelligent Transfer Service
- How the Javali trojan weaponizes Avira antivirus
- HelloKitty: The ransomware affecting CD Projekt Red and Cyberpunk 2077
- DreamBus Botnet: An analysis
- Kobalos malware: A complex Linux threat
Get certified and advance your career!
- Exam Pass Guarantee
- Live instruction
- CompTIA, ISACA, ISC2, Cisco, Microsoft and more!