Malware analysis February 14, 2017 Security Ninja Malware Analysis with OllyDbg In this part of the article series, we will look how we can look at the inner workings of a malware. In part 1 and part 2 we have worked on the behavioral analysis...
Malware analysis February 9, 2017 Security Ninja Static Analysis In Part 1, we have seen that how to perform behavioral analysis on a malicious specimen. In this article, we will look at another specimen and perform behavioral...
Malware analysis February 1, 2017 Pierluigi Paganini Shamoon Reloaded: the Mysterious Return of the Dreaded Wiper On August 15th, 2012, the Saudi Arabia's oil company, Saudi Aramco announced that its systems and its internal network were victims of a cyber-attack. According...
Malware analysis January 31, 2017 Security Ninja Code Analysis In this article series, we will learn about malware behavioral and code analysis. For part 1, I will cover behavioral analysis of one of the specimens. Behavioral...
Malware analysis January 26, 2017 SecRat TrojanDownloader.Wask Analysis The file is not packed. It has been written in MSVC (Possibly 2010). Following are the headers present in the PE structure. Below is the PEDUMP of the Trojan PE...
Malware analysis January 18, 2017 SecRat Analysis of a Spam Bot Binary starts fixing the API calls. After fixing up the imports, the Reg32 path is retrieved. Default heap is accessed, and Socket / MAC addresses are retrieved....
Malware analysis November 28, 2016 Pierluigi Paganini The Mirai Botnet: A Milestone in the Threat Landscape In August 2015, the researcher MalwareMustDie analyzed samples of a new ELF Trojan backdoor, dubbed ELF Linux/Mirai, specifically designed to target IoT...
Malware analysis November 3, 2016 Security Ninja Recognizing Packed Malware and its Unpacking Approaches-Part 2 In Part 1 of this article series, we had a look at the ways to recognize packed executables and various ways to automate the unpacking process. In this article,...
Malware analysis October 28, 2016 Security Ninja Recognizing Packed Malware and its Unpacking Approaches-Part 1 In this article series, we will learn about the characteristics possessed by a packed malware specimen and how to unpack them. In the unpacking section, we...
Malware analysis September 12, 2016 Pierluigi Paganini Linux Malware: Novelties in the Threat Landscape In the last couple of years, security firms have observed an increasing number of malware specifically designed to target Linux-based systems. Linux, like...