Published inInfoSec Write-upsAnti-Reversing Techniques (Part 2)In the first part we discussed some common techniques used by malware authors to protect their applications from reverse engineering. In…Dec 5, 2022Dec 5, 2022
Published inInfoSec Write-ups[ Malware Analysis #5] — Eternity Project — Eternity WormIn this article we will continue the analysis of the Eternity Project, this time we will have a look at the Eternity Worm, so let’s start…Nov 20, 20221Nov 20, 20221
[ Malware Analysis #4] —Eternity Project — Eternity StealerThe Eternity Project is malware toolkit sold as a malware-as-a-service (MaaS) that offers customize malware features beside the core…Aug 29, 2022Aug 29, 2022
Published inInfoSec Write-ups[Malware Analysis #3] — Disk WriterIn this article I tried to analyze this malware sample that I took from Malware Bazaar with Linux machine so let’s begin.Jul 14, 20221Jul 14, 20221
Published inInfoSec Write-upsMalware Analysis — FFDroiderThis is malware analysis write-up for FFDroider stealer malware which is a new malware that was first spotted in April 2022.May 30, 20223May 30, 20223
Published inInfoSec Write-upsMalware Analysis — NanoCore RatIn This series of write-ups/articles of Malware analysis I will pick up a random sample from Malware Bazaar https://bazaar.abuse.ch/ and I…Mar 27, 20221Mar 27, 20221