0xM3H51NinInfoSec Write-upsAnti-Reversing Techniques (Part 2)In the first part we discussed some common techniques used by malware authors to protect their applications from reverse engineering. In…Dec 5, 2022Dec 5, 2022
0xM3H51NinInfoSec Write-ups[ Malware Analysis #5] — Eternity Project — Eternity WormIn this article we will continue the analysis of the Eternity Project, this time we will have a look at the Eternity Worm, so let’s start…Nov 20, 20221Nov 20, 20221
0xM3H51N[ Malware Analysis #4] —Eternity Project — Eternity StealerThe Eternity Project is malware toolkit sold as a malware-as-a-service (MaaS) that offers customize malware features beside the core…Aug 29, 2022Aug 29, 2022
0xM3H51NinInfoSec Write-ups[Malware Analysis #3] — Disk WriterIn this article I tried to analyze this malware sample that I took from Malware Bazaar with Linux machine so let’s begin.Jul 14, 20221Jul 14, 20221
0xM3H51NinInfoSec Write-upsMalware Analysis — FFDroiderThis is malware analysis write-up for FFDroider stealer malware which is a new malware that was first spotted in April 2022.May 30, 20223May 30, 20223
0xM3H51NinInfoSec Write-upsMalware Analysis — NanoCore RatIn This series of write-ups/articles of Malware analysis I will pick up a random sample from Malware Bazaar https://bazaar.abuse.ch/ and I…Mar 27, 20221Mar 27, 20221