Jump to content
View in the app

A better way to browse. Learn more.

Tuts 4 You

A full-screen app on your home screen with push notifications, badges and more.

To install this app on iOS and iPadOS
  1. Tap the Share icon in Safari
  2. Scroll the menu and tap Add to Home Screen.
  3. Tap Add in the top-right corner.
To install this app on Android
  1. Tap the 3-dot menu (⋮) in the top-right corner of the browser.
  2. Tap Add to Home screen or Install app.
  3. Confirm by tapping Install.

Malware Reverse Engineering

Debugging, disassembling and documenting interesting malware...

  1. only me
    Started by only me,

    Hi All , most of malware analyst gets a pain from VMProtect packing as I hear:), I am new to this area and I was starting my search about this packing. Could you please share your method to dial with this packing.

      • Haha
    • 2 replies
    • 14.9k views
  2. secursig

    I thought all you reverse engineers out there might enjoy this since it talks about the calls use in late malware https://blogs.technet.microsoft.com/mmpc/2017/03/08/uncovering-cross-process-injection-with-windows-defender-atp/

    • 0 replies
    • 6.7k views
  3. Aldhard Oswine
    Started by Aldhard Oswine,

    What ways are to analyze unnamed third-party library functions in IDA Pro, such as OpenSSL, Boost, etc.

    • 0 replies
    • 7.3k views
    Aldhard Oswine
  4. Extreme Coders
    Started by Extreme Coders,

    Ransomware is very common these days. Once it installs on a user machine it begins encrypting files. When the user comes to know about the ransomware attack it is already too late. Unless the user has a backup, he/she must must pay the ransom to recover the files. Luckily there has been cases where due to a faulty implementation of cryptography breaking such malware becomes feasible. The recently discovered petya ransomware is an example. This blog post is a short walk through on breaking the petya ransomware with a constraint solvers. Hope you like it & find useful. http://0xec.blogspot.com/2016/04/reversing-petya-ransomware-with.html

      • Like
    • 5 replies
    • 8.7k views
  5. opc0d3
    Started by opc0d3,

    Hello! I'm trying to make a lab to analyze malware grant to it internet connection, but with certain rules. I was thinking to make 2 vms, windows lab to do analysis and the middle server linux remnux. I thought to isolate my windows from host network creating a internal network between remnux and windows. On remnux i would port fowarding (when i grant it) from internal network adpater to nat adapter, so the windows couldn't see my host. My goal it's to avoid infected machine contacting my host, and on remnux i would set up iptables to block any request but http from windows directly to remote, blocking any lan interaction. Can anyone help me think in way to…

    • 0 replies
    • 5.1k views
  6. Teddy Rogers
    Started by Teddy Rogers,

    If your not sick and tired of hearing/reading about it yet and you are still interested in studying WannaCrypt you can find information and samples from the following links... https://gist.github.com/rain-1/989428fa5504f378b993ee6efbc0b168 Samples https://gist.github.com/rain-1/989428fa5504f378b993ee6efbc0b168#malware-samples Ted.

      • Like
    • 18 replies
    • 12.3k views
  7. Aldhard Oswine
    Started by Aldhard Oswine,

    I'm trying to implement process hollowing in Win10 for x64 processes. Which is almost same as in this code: https://github.com/m0n0ph1/Process-Hollowing/blob/master/sourcecode/ProcessHollowing/ProcessHollowing.cpp, but for x64. and for an entry point, I'm using "Rcx" register. It works for apps if target and victim process is same, otherwise, it causes the error: "the application was unable to start correctly 0xc00000142". It also works apps, which are created by me for the test. What are possible mistakes in my implementation?

    • 1 reply
    • 7.1k views
    Aldhard Oswine
  8. Aldhard Oswine
    Started by Aldhard Oswine,

    I'm trying to implement dll injection technique from PMA book. It works for third-party applications, such as notepad++.exe, chrome.exe, FoxitReader.exe, etc. But don't work for windows applications, such as notepad.exe, explorer.exe, etc. With third-party app "CreateRemoteThread" returns threadId, with windows app returns 0. Can you help me to understand what happens?

      • Like
    • 2 replies
    • 7.1k views
    Aldhard Oswine
  9. FormosaTBM
    Started by FormosaTBM,

    Hey guys, I know there's probably a post like this everyday asking how to become a Virus/Malware, ReverseEngineer Analyst, so if nobody replies I wont be too offended. I have done some researches on redit, and If anyone have the time to read through this and can help steer me in the right direction or perhaps let me know of something I may have missed while researching, please let me know! My Background: Not really a Programmer, but have learned a ltitle bit of Java back in the days in college. Have studied a little bit of Python through the book Automate the Boring Stuff (first half of the book) Have attempted to study some C++ a whi…

    • 0 replies
    • 5.7k views
  10. Aldhard Oswine
    Started by Aldhard Oswine,

    When I read PMA, Kernel debugging and rootkit analysis were most difficult topics/Labs for me, now I want to return those topics and fill holes in my knowledge. Do you know good books/posts/papers/videos about rootkit analysis?

    • 1 reply
    • 6.4k views
    Aldhard Oswine
  11. Aldhard Oswine
    Started by Aldhard Oswine,

    I found that using COM is a powerful technique from a malware perspective. Are there any good paper/post about COM usage in details?

      • Like
    • 5 replies
    • 11.9k views
  12. null_endian
    Started by null_endian,

    I keep finding myself in this situation where I analyze malware on my lab computer... But Now I need to get the analysis work uploaded or onto a "safe" computer... But for example, I never want to login to any accounts on my lab computer once I've ran samples, and I also don't want to open up any link to my main box.... So how do you guys get files or other work from the lab computer onto safe computers or online?

    • 1 reply
    • 5.5k views
  13. null_endian
    Started by null_endian,

    I have 2 questions: 1. Is anybody familiar with a way to zoom in and out in IDA Pro Graph View without a scroll wheel? I use a special mouse which does not have one. The only ways I've found is hit "w" to zoom WAY OUT and 1 to zoom WAY IN. However, I lost the gradual zoom capability with this mouse :(. 2. What are some ways to handle locating the below function calls in code? When I xref these API calls, I'm brought to a series of jmps and the API calls themselves never actually appear in the code. Interestingly, I also cannot find references to the memory addresses of the jmps themselves in code either, so the code must use some offsets to access these jumps. Effec…

      • Like
    • 3 replies
    • 9.3k views
  14. Aldhard Oswine
    Started by Aldhard Oswine,

    I found Dr.Fu RE malware helpful but little bit out-of-date, do you have any better options?

      • Like
    • 11 replies
    • 9k views
    Aldhard Oswine
  15. Aldhard Oswine
    Started by Aldhard Oswine,

    I've VBA script extracted from a .doc document, it's obfuscated, how can I debug this script?

      • Like
    • 3 replies
    • 10.9k views
    Aldhard Oswine
  16. Etor Madiv
    Started by Etor Madiv,

    I found a malware sample (1) that is packed using Safengine Shielden v2.3.9.0, I'm not able to debug it because it is detecting that it is under debugging, after that I tried ScyllaHide plugin for Olly2 but it is still detected. The packer reads the files: KernelBase.dll, kernel32.dll, user32.dll, msvcrt.dll, ... and puts them in a random Memory locations, replaces some addresses, so it will be able to use its own copy of those DLL files instead of the original ones, and make debugging more harder (no symbols will be availabe to identify system functions). Dynamically running the file, I'm able to identify that the file drops a .bat in a randomly created folder …

      • Like
    • 2 replies
    • 11.8k views
  17. justcrypto
    Started by justcrypto,

    Hello Folks, I don't do reversing for a living so the questions may be noobish. Trying to convert the shellcode in the attached html file to an executable. Its unicode, so I converted to HEX and then used the shellcode2exe.py tool to convert it to executable. When I run the shellcode in a debugger it terminates. Although strings shows it has LoadLibrary(). I see that there are two eval functions calling two different shellcodes. Are these two shellcodes interconnected. Do I need to combine them to analyze. Any other pointers to run it successfully in a debugger. Any help would be great!! Sign-in.zip

      • Like
    • 2 replies
    • 6.3k views
  18. null_endian
    Started by null_endian,

    Hello, So I am new to this and reading several books, including Practical Malware Analysis. I only have 2 usable computers: 1 is my main machine which is a brand new i7 with 16 GB of RAM expandable to 32GB and a GPU with Win 10, the other is my old Core 2 Duo T6600 machine with 4GB of RAM from 2009 that I have Linux on. My initial thought for creating a malware analysis lab was to use the Linux box with a virtual machine running Windows... However, last night I quickly discovered that was not going to happen because the computer is frankly too old to run a VM smoothly, especially since the processor doesn't have virtualization. So that means I gotta do it on m…

      • Like
    • 4 replies
    • 12.5k views
  19. null_endian
    Started by null_endian,

    Hello, I'm new to the field so wanted to ask this. How closely related are malware analysis and reversing from a professional standpoint? What I mean by this is, I assume the goals of reverse engineering a system are to fully document that system... So go module-by-module through it, figure out what it ALL does, figure out which compiler was used, which version of which language, etc... Whereas malware analysis, I'm not sure to which "extent" is commonly used. For example, as a malware analyst at an antivirus firm, do they do the entire reverse engineering process with each sample or is the goal here to just observe and document all of its BEHAVIORs and then get far…

    • 1 reply
    • 9k views
  20. Cyberwarfare
    Started by Cyberwarfare,

    where can I download GameOver Zeus Malware sample for research purpose? Any Help appreciated !

    • 3 replies
    • 9k views
  21. Hacktreides
    Started by Hacktreides,

    Hello, I find this malware in the wild, anyone know his family, and his packer type? There is a lot of junk code and a lot of selfextraded code, if someone have a quick way to unpack it. https://www.virustotal.com/en/file/86e6be6c7e474b2115aef450724ee1a6464b43888d45bdf48d0a404c7dd03b88/analysis/ Thank iphone_video.exe

      • Like
    • 3 replies
    • 8.6k views
  22. gundamfj

    I would like to have some statistics about What percentage of malware use custom packer/cryptor to protect itself? I have been googling for a while but could only find technical study of some custom packers. Any help?

    • 1 reply
    • 9.3k views
  23. Noteworthy
    Started by Noteworthy,

    Hi SnD, This is a small tool I wrote while reversing some malwares. It performs a bunch of nowadays malwares tricks and the goal is to see if you stay under the radar. That could be useful if: You are making an anti-debug plugin and you want to check its effectiveness. You want to ensure that your sandbox solution is hidden enough.. You want to write behavior rules to detect any attempt to use these tricks. Please, if you encounter any of the anti-analysis tricks which you have seen in a malware, don't hesitate to contribute. List of features supported: Anti-debugging attacks IsDebuggerPresent CheckRemoteDebuggerPresent …

    • 4 replies
    • 15.8k views
  24. myli
    Started by myli,

    Hello, i've a question. Ive a DLL (yes, i know the source) which is confused using ConfuserEx 0.5 with .NET Framework 4.52. Now i've tried to to open the DLL using several disassembler but no result. I found several tutorials how to unconfuse the DLL in this forum but all of them are not successfully in this case. Ive tried ConfuserExFixer, MethodsDecrypter, ... and so on. could anyone tell me HOW it's possible and a decrypted result? Attached is the DLL. Its nothing special. Thanks. CGBfunctions.zip

      • Like
    • 10 replies
    • 20.7k views
  25. Razz
    Started by Razz,

    Hi guys, I'm learning about malware and I remember stumbling upon this cool forum some time ago. I recently downloaded a pdf of a book, because I wanted to look up some pages in the book since it was used as a source in an article I was reading. It's a pretty obscure book and since I couldn't find a legitimate source for it, I thought what the hell why not try one of the risky fake-looking torrent links. To my surprise the torrent downloaded immediately and I got a .rar file. Normally with these things the rar file is either encrypted with a password or the pdf itself is fake and only contains instructions on how to complete a CPA offer to get access to the most…

    • 1 reply
    • 9.9k views

Configure browser push notifications

Chrome (Android)
  1. Tap the lock icon next to the address bar.
  2. Tap Permissions → Notifications.
  3. Adjust your preference.
Chrome (Desktop)
  1. Click the padlock icon in the address bar.
  2. Select Site settings.
  3. Find Notifications and adjust your preference.