Malware analysis

Dridex Downloader Analysis

Introduction Yesterday I received in my company inbox an email with an attached .xlsm file named D92724446.xlsm coming from Clare588@78-83-77-53.spectrumnet.

Comparison of Cloud Automated Malware Analysis Tools

Cloud malware analysis services In this section, we're providing a list of cloud automated online malware analysis tools that are not available anymore due t

Gh0st RAT Part 2: Packet Structure and Defense Measures

We have seen in Part 1 of this series how sophisticated Gh0st RAT is and how difficult it is to identify this attack because of the variants it comes in. In

Gh0st RAT: Complete malware analysis – Part 1

In this article series, we will learn about one of the most predominant malware, named Gh0st RAT, whose source code is dated back to 2001 but it is still rel

Overview of Automated Malware Analysis in the Cloud

Malicious attackers are constantly on the lookout for new and advanced attacks, which they use to spread malware around the world. There are a vast number of

Tyupkin ATM Malware Analysis

Introduction Some time ago, Kaspersky discovered and reported a new type of malicious program called Tyupkin, which targets ATM machines by moving beyond tar

SoakSoak Malware and How to Protect Your WordPress Website

If you follow security news, I am sure you have heard of SoakSoak malware. It has been in the news for the past few days because it affects more than 100,000

Evolution of Banking Malwares, Part 2

Web Injects This technique is used in scenarios where critical information such as Social Security Number (SSN) or Personal Identification Number (PIN) is ot

Evolution of Banking Malwares, Part 1

Introduction Why are malware authors so interested in banking malware? Simply because this is where the money is! Nowadays, banking malware, specifically ban

Pattern-Based Approach for In-Memory ShellCodes Detection

Introduction During an analysis, it can be really useful to know some common instructions with which malware, and more specifically shellcodes, achieve their