Open in app

Sign In

Write

Sign In

0xM3H51N

100 Followers

Home

About

Published in InfoSec Write-ups

·Dec 5, 2022

Anti-Reversing Techniques (Part 2)

In the first part we discussed some common techniques used by malware authors to protect their applications from reverse engineering. In this second part, we will take a look at more methods and techniques used to detect and prevent reverse engineering. Debugger Detecting: Code Execution Timing technique: When using a debugger to analyze an executable sometimes…

Malware Analysis

4 min read

Anti-Reversing Techniques (Part 2)
Anti-Reversing Techniques (Part 2)
Malware Analysis

4 min read


Published in InfoSec Write-ups

·Nov 20, 2022

[ Malware Analysis #5] — Eternity Project — Eternity Worm

In this article we will continue the analysis of the Eternity Project, this time we will have a look at the Eternity Worm, so let’s start… Artifacts: Eternity Worm Stage 1:

Malware Analysis

6 min read

[ Malware Analysis #5] — Eternity Project — Eternity Worm
[ Malware Analysis #5] — Eternity Project — Eternity Worm
Malware Analysis

6 min read


Published in InfoSec Write-ups

·Sep 6, 2022

Anti-Reversing Techniques (Part 1)

Introduction Anti-Reversing Techniques is very useful to protect your code especially if your business is depending on that code or what ever reason you might have to protect it from reversing or cracking, but in other case, Malware Authors tend to use anti reversing techniques to make the Process of Analyzing…

Reverse Engineering

6 min read

Anti-Reversing Techniques (Part 1)
Anti-Reversing Techniques (Part 1)
Reverse Engineering

6 min read


Aug 29, 2022

Malware Analysis [#4] —Eternity Project — Eternity Stealer

The Eternity Project is a malware toolkit sold as a malware-as-a-service (MaaS) that offers customize malware features beside the core functionalities, the threat actors distributes their service through an anonymous Tor marketplace and Telegram channels as “Eternity Group” . Each malware item in the toolkit is individually priced: Eternity Stealer…

Malware Analysis

20 min read

[ Malware Analysis #4] —Eternity Project — Eternity Stealer
[ Malware Analysis #4] —Eternity Project — Eternity Stealer
Malware Analysis

20 min read


Published in InfoSec Write-ups

·Jul 14, 2022

Malware Analysis [#3]— Disk Writer

In this article I tried to analyze this malware sample that I took from Malware Bazaar with Linux machine, but eventually I needed to use windows machine for debugging and disk analysis, so let’s begin. Sample: MD5:95bfd387a4105a2e940f3c50c5aa1069 SHA256:df81fe69de455d1aeceb00e4cd4702d94edf9ab917dede008b65d0f045d75baf General Info: Analyzing a windows malware sample on Linux machine statically, we could use many…

Malware Analysis

6 min read

[Malware Analysis #3] — Disk Writer
[Malware Analysis #3] — Disk Writer
Malware Analysis

6 min read


Published in InfoSec Write-ups

·May 30, 2022

Malware Analysis [#2] — FFDroider

This is malware analysis write-up for FFDroider stealer malware which is a new malware that was first spotted in April 2022. Our sample of today: md5(b1d856afe8ffd2649843d64affe9d4c3) Static Analysis: Looking at our sample in PEStudio we can see it is a 32-bit sample with high entropy and recently compiled date and the file…

Malware

8 min read

Malware Analysis — FFDroider
Malware Analysis — FFDroider
Malware

8 min read


Published in InfoSec Write-ups

·Mar 27, 2022

Malware Analysis [#1]- NanoCore Rat

In this series of write-ups/articles of Malware analysis I will pick up a random sample from Malware Bazaar https://bazaar.abuse.ch/ , and I will Analyze it without knowing what it is, (BlackBox) approach. let’s begin… Our sample of today: md5(5846c3588fbcf6a5078b7a2413da0345).

Malware

6 min read

Malware Analysis — NanoCore Rat
Malware Analysis — NanoCore Rat
Malware

6 min read

0xM3H51N

0xM3H51N

100 Followers

Malware Analyst & Reverse Engineer

Following
  • Thexssrat

    Thexssrat

  • Immunefi

    Immunefi

  • Anthony Today

    Anthony Today

  • StackZero

    StackZero

  • GhouLSec

    GhouLSec

Help

Status

Writers

Blog

Careers

Privacy

Terms

About

Text to speech