Malware analysis

Petya Ransomware Analysis Part I

Introduction What makes Petya a special ransomware is that it doesn't aim to encrypt each file individually, but aims for low-level disk encryption. In this

Process Hallowing

In this article, we will learn what process hallowing is, how is it done, and how we can detect it while performing memory analysis. Process Hallowing It is

Common malware persistence mechanisms

As we know, malware becomes stealthier by somehow achieving persistence on the exploited machine. This helps malware authors to inject/exploit once, and the

Android Malware Analysis

Objective: This exercise covers the techniques to analyze Android malware by using a custom malware sample. The malware, when running on an Android device,

Memory analysis using redline

Memory Analysis has become very useful for malware hunting and investigation purposes. Redline is a tool which is used to analyze the memory samples collecte

Important Code Constructs in Assembly Language: Advanced

We have covered some basic operations and conditional statements in Part 1. In this article, we will cover some more complex data structures to recognize in

Important Code Constructs in Assembly Language: Basics

This article represents a continuing of the malware analysis course we began with the complete structure of PE and ELF earlier. Another important concept whi

Complete Tour of PE and ELF: An Introduction

I have decided to come up with an end-to-end malware analysis course and even extend it to memory forensics and detecting APT's. Though this might sound grea

PoS Malware: All You Need to Know

Introduction to POS malware PoS malware continues to be a serious threat to several industries, from retail to the hotel industry. Respect our previous post,

How malware detects virtualized environment (and its countermeasures)

Virtual Machines are usually considered a good way to analyze malware as they can provide an isolated environment for the malware to trigger but their action