Malware analysis

SQL injection analysis

It is one thing to be able to execute a simple SQL injection attack; it is another to do a proper investigation of such an attack. Unfortunately, there is no

BlackEnergy Used as a Cyber Weapon Against Ukrainian Critical Infrastructure

Introduction Recently the researchers at ESET firm spotted a new wave of malware-based attacks that are targeting media outlets and energy companies in Ukrai

Malware Researcher’s Handbook (Demystifying PE File Part 2)

Demystifying PE File - Continued As per our previous article we will continue on this article here by the rest of section of PE file. Those who don't know th

Reversing the Pony Trojan part II

Pony is a stealer Trojan and has been active for quite a while now. It was responsible for stealing over $200,000 in bitcoins ( https://threatpost.com/latest

A Case Study of Information Stealers: Part I

Introduction: A stealer is a type of malware that looks for passwords stored on the machine and sends them remotely (e.g. mail, HTTP) to an attacker. Most st

Reversing the Pony Trojan Part I

Pony is a stealer Trojan and has been active for quite a while now. It was responsible for stealing over $200,000 in bitcoins ( https://threatpost.com/latest

Analyzing a DDoS Trojan

MD5: 67877403db7f8ce451b72924188443f8 Installer: In the main function of the malware, two subroutines are used for checking whether the malware is already in

Beta Bot Analysis: Part 2

Extracting the Botnet Configuration: The bot configuration is encrypted inside the bot and decrypted while the bot is running. In 1.0.2.5, 1.5 and 1.6 versi

Andromeda Bot Analysis part 2

Bot Analysis: Now, you get the original Andromeda build file. Load the unpacked sample at OllyDBG. As before, after the stack frame at the EP, you see that t

Andromeda Bot Analysis part 1

Introduction: Andromeda, also known as Win32/Gamarue, is an HTTP based botnet. It was first spotted in late 2011, and is still at this moment used a lot in h