Malware analysis

Malware Anti-Analysis Techniques and Ways to Bypass Them

This article series will focus on various anti-analysis techniques used by malware, and then we will discuss various ways in which the anti-analysis techniqu

Launching Shellcode from Cat Pictures

We all know the internet loves cats! I was thinking of how we can combine cats and malware. Then, it struck me! [pkadzone zone="main_top"] I occasionally see

Avatar Rootkit: Deeper Dropper Analysis

In this second article on the dropper, we will resume our analysis right where we left off: the decryption of the key and data. After the decryption, two str

RanRan and PetrWrap Threats: Political and Criminal Abuses in the Ransomware Landscape

Ransomware continues to be one of the most profitable cyber threats, for this reason, every week we see strains of malware in the wild with new features. The

PowerShell remoting artifacts: An introduction

Since PowerShell usage by malware is on the rise, in this article series, we will learn about the various artifacts related to PowerShell remoting that can b

Ursnif Malware

These days, along with the unforeseen climatic conditions, several unpredictable malware campaigns are also occurring across the connected world. Mostly Offe

Avatar Rootkit: Dropper Analysis

Avatar was first detected by ESET circulating in the wild in early 2013 [1]. However, no samples were collected for analysis until May of the same year. ESET

Exclusive – A Close Look at the Largest Credential Harvesting Campaign Via an IoT Botnet

Exclusive: MalwareMustDie discovered a criminal gang that is using SSH TCP direct forward attack technique in a large-scale operation. The popular researche

Malware Analysis with OllyDbg

In this part of the article series, we will look how we can look at the inner workings of a malware. In part 1 and part 2 we have worked on the behavioral an

Static Analysis

In Part 1, we have seen that how to perform behavioral analysis on a malicious specimen. In this article, we will look at another specimen and perform behavi