-
Recent Posts
Recent Comments
Archives
- May 2022
- April 2022
- December 2021
- November 2021
- July 2021
- May 2021
- March 2021
- August 2020
- July 2020
- March 2020
- February 2020
- January 2020
- October 2019
- September 2019
- July 2019
- May 2019
- April 2019
- March 2019
- January 2019
- November 2018
- October 2018
- August 2018
- July 2018
- May 2018
- April 2018
- December 2017
- November 2017
- October 2017
- August 2017
- April 2017
- February 2017
- November 2016
- September 2016
- August 2016
- July 2016
- June 2016
- April 2016
- March 2016
- February 2016
- January 2016
- November 2015
- April 2014
- December 2013
- September 2013
- July 2013
- June 2013
- April 2013
- December 2012
- August 2012
- July 2012
- June 2012
- May 2012
- March 2012
- February 2012
- December 2011
- November 2011
- October 2011
- August 2011
- December 2009
Categories
Meta
Tag Archives: Reverse Engineering
SunCrypt, PowerShell obfuscation, shellcode and more yara
This didn’t start as a blog post. It started as a conversation with Hari Charan @grep_security about something they were looking at called SunCrypt ransomware. Looking up the name I ran across a couple of interesting blog post, one by … Continue reading
Posted in Malware, PowerShell
Tagged Malware Analysis, Obfuscation, PowerShell, Ransomware, Reverse Engineering
1 Comment
Chasing malware down the rabbit hole to see where it goes.
Lets start this journey with the blog post by Pondurance titled “777 RANSOMWARE COMBINES WITH TRICKBOT” located here. There is not a whole lot here but it describes 2 layers of shellcode and some indicator’s and the first is the … Continue reading
Posted in Malware, PowerShell, security
Tagged Malware Analysis, Reverse Engineering, Shellcode
Comments Off on Chasing malware down the rabbit hole to see where it goes.
A deeper look inside one of the new Emotet Malware Docs
The sample here comes from a quick search supplied by ANY.RUN @anyrun_app of #emotet-doc to filter quickly on documents you want to look at. Twitter reference Here and the link to the file we are going to use Here. One … Continue reading
Posted in Malware
Tagged Malware Analysis, Office Documents, Reverse Engineering, Security
Comments Off on A deeper look inside one of the new Emotet Malware Docs
A Look under the hood of a batch encrypted file
The sample in question today is thanks to a Twitter thread by Nick Carr @ItsReallyNick and Daniel Bohannon @danielhbohannon of FireEye located Here about this builder being used to encode batch scripts. After downloading the sample from VirusBay @virusbay_io that … Continue reading
Posted in Malware, Programming, security
Tagged Decoding, Malware Analysis, Reverse Engineering
Comments Off on A Look under the hood of a batch encrypted file