Malware analysis September 25, 2015 Ayoub Faouzi Andromeda Bot Analysis part 1 Andromeda, also known as Win32/Gamarue, is an HTTP based botnet. It was first spotted in late 2011, and is still at this moment used a lot in herding. It has...
Malware analysis July 6, 2015 Security Ninja MOOSE Malware: Analysis Part One of this series was a very basic level, and had only thrown light on what Moose Malware actually is, as well as its components and related IoC's. In...
Malware analysis July 2, 2015 Shaman Vilen Win32/Lethic Botnet Analysis Lethic is a spam botnet consisting of an estimated 210 000 - 310 000 individual machines which are mainly involved in pharmaceutical and replica spam. At the...
Malware analysis June 23, 2015 Security Ninja MOOSE Malware: Basics In this article series, we will learn about a famous Linux family of malware known as MOOSE, which is used to steal unencrypted traffic over the wire and infect...
Malware analysis June 18, 2015 Nikhil Kumar Analyzing and writing a local exploit So far, in the previous articles, we learnt how to exploit an application remotely. We ran the Python script directly on the Machine B, which was the attacker...
Malware analysis June 16, 2015 Revers3r Malware Researcher’s Handbook: Introduction All the Stuff You Know Before Starting Research Malware research contains a lot of information like reverse engineering, exploit-kit, exploit analysis, botnet...
Malware analysis June 5, 2015 Ayoub Faouzi Asprox / Kuluoz Botnet Analysis Kuluoz, aka Asprox, is a spam botnet that emerged in 2007. It has been known for sending mass of phishing emails used in conjunction with social engineering...
Malware analysis May 26, 2015 Security Ninja Windows functions in malware analysis – cheat sheet – Part 1 In this article, we will learn briefly about the various windows functions commonly encountered by malware analysts. Accept: This function is used to...
Malware analysis May 21, 2015 Security Ninja Mumblehard Malware In this article, we will learn about a malware known as Mumblehard which is known for targeting Linux and BSD OS. This malware opens a backdoor that gives...
Malware analysis May 12, 2015 Security Ninja Dynamic Analysis Techniques As we have covered the malware analysis basics with static techniques here, this post is all about performing the basic analysis of malware using dynamic technique. As...