Malware Reverse Engineering
Debugging, disassembling and documenting interesting malware...
364 topics in this forum
-
- 0 replies
- 5.8k views
This blog post discussed the details of analysing some .net malware: http://blogs.cisco.com/security/talos/reversing-multilayer-net-malware
-
LeeZay sending malwares
by TheProxy RE- 0 replies
- 4.9k views
so this guy send me actualy maware so he can export shit from my pc or get some kind of information. here is detailed info about malware + screenshots https://www.hybrid-analysis.com/sample/d3e07c339ba952865e87000636b92fe67f23e9aaf2cd24f9e4d65552e9c51526?environmentId=100 Also here is unpacked malware: http://www12.zippyshare.com/v/RnmwqGGT/file.html (Do not open if you dont have any malware checking skill) (Open at your own risk)
-
write a sandbox
by rever_ser- 2 replies
- 17.8k views
hi I want to write a sandbox. I want to know exactly what parts made up a sandbox and how to work any how. Can anyone recommend a resource in this regard?
-
How to decode string in malware ?
by kb432- 3 replies
- 7.2k views
How to decode Encoded or Encrypted string in Reverse engineering a malware ? i heard there is a way using python script and Immunity debugger ? What is most effective option and which options should i try ? I looked up youtube and good but nothing useful. Help me with this. Thanks Tuts4you!
-
Does anyone have old Locky sample?
by gundamfj- 7 replies
- 5.7k views
So I am doing research on Locky. I notice recent Locky sample doesn't import SMB related API. You may have heard of Locky also tries to encrypt files in network share e.g. printer. So does anyone have old Locky samples(5 months ago)? I got one old sample from one guy in this forum. But that sample crashes on InterlockedIncrement. I could only find recent samples in VirusShare.
-
need help to unpack .NET malware
by gundamfj- 17 replies
- 9.6k views
I have this malware(possibly Locky variant), which is packed by an unknown packer(de4dot -d). It looks like it's packed by customized ConfuserEx, but I am not 100% sure(newbie). I have tried using tools like NoFuserEx, de4dot, UnconfuserEx, without any luck. I have this idea: maybe I could pause on some memory management API, e.g. VirtualAlloc and monitor the memory region's size it allocates. If the memory region is enough large to hold the malware actual payload, keep an eye on it, maybe I could finally get the payload. So is there any .NET debugger allowing me to pause on System API like VirtualAlloc? I know I could use debugger like Olly, but if I open…
-
cerber ransomware reverse question
by Guest kinn7s- 1 follower
- 3 replies
- 6.3k views
Hi, I'm reversing this ransomware after an interesting reading found surfing the net. hxxps://blog.malwarebytes.com/threat-analysis/2016/03/cerber-ransomware-new-but-mature/ What I'm trying to do is reversing the file encryption routines. Found where key is generated, buffer encrypted ecc. Can't undestand how the key is encrypted and stored into the file! (decrypt the original key) If someone is really interested, I'll share my findings (malware authors read this forum too I guess...) I'm doing this only because it' become a big challange to me and can't move on... sorry for my english
-
I have a malicious dotnet sample
by Hacktreides- 5 replies
- 6k views
Hello, I have a malicious dotnet sample packer, anyone known the packer type and how to unpack it? I have try de4dot but it's failed. Thank you Dumped.zip
-
Research Rootkit (Linux)
by kao- 0 replies
- 4.9k views
https://github.com/NoviceLive/research-rootkit
-
Reference a movie? auscultated code!
by 0nion- 1 reply
- 5.5k views
A reference from "black hat' movie 2015. The hacker cracks Encrypted code. How a malware has Encrypted code ended in ? And how to crack that ? Any information or tutorial or article would be appreciated. I do reverse engineer using IDA pro ( static analysis ).
-
Guide for Static malware analysis [?]
by Cyberwarfare- 5 replies
- 6k views
Is there any Ebook or video series or tutorial on Reverse engineering using IDA Pro ( static analysis ) ? I will appreciate your concern ! Thanks
-
(Help Request) .Net Protector Identification 1 2
by madskillz- 25 replies
- 22.1k views
Hi I tried die , peid , protecton id , rdg , but cannot detect protector. de4dot detected as deepsea , but deobfuscation ws not done. File attached FoxUserTools.zip File can be malware , etc , please use VM , protection. Need packer identification and unpack help. Regards
-
reversing industrial malwares
by Mr.peach- 6 replies
- 5.7k views
Hi all experts I want to know what tools are used to analyze the industrial malwares
-
Reversing an obfuscated java malware
by Extreme Coders- 1 reply
- 7.4k views
This document is a small write up demonstrating tools and techniques that can be used while reversing java code. The malware used for this purpose is the AlienSpy RAT (Remote Access Trojan) which has also been attached to this post. The password of the file malware sample.rar is infected. This is live malware. Secure your system before tinkering with it. Additionally, the decompiled source code of the malware has also been provided for study. Reversing an obfuscated java malware.pdf malware sample.rar decompiled malware source.rar
-
Reverse Kaspersky Virus Signatures
by helderc- 4 replies
- 7.4k views
Does any body know how to reverse Kaspersky virus signatures? I have looking for something like that in the leaked source code, but its huge and I couldnt find anything. Comments are welcome!
-
Which Virtual Machine Software do you prefer? 1 2 3
by deepzero- 1 follower
- 61 replies
- 35.2k views
Hi, I have been using Microsoft VirtualPC for years now. Which Virtualization Software do you prefer?
-
Tyupkin Malware...or bank's worst nightmare
by cucuielu- 1 reply
- 6.4k views
Can anyone fully deobfuscate theese 2 samples? MALWARE!!! It's not meant for regular PC... Tyupkin.zip
-
WinRAR Vulnerability...
by Teddy Rogers- 6 replies
- 6.7k views
WinRAR Vulnerability https://blog.malwarebytes.org/security-threat/2015/09/latest-winrar-vulnerability-has-yet-to-be-patched/ Ted.
-
[DecompileMe] Virus found in my PC [.NET]
by bomblader- 4 replies
- 6.8k views
Looks like I was infected by some virus, no idea where I got it. It's .NET You have to run it like this in order to run: adobe_flash_player.exe /00000017 Anyone can decompile this and find out what's doing? Looks like a custom obfuscator was used. De4Dot is cleaning it up but strings and other data is still encrypted. Thanks! adobe_flash_player.rar
-
- 0 replies
- 5.8k views
Table of contents: All I can say is that I really enjoyed the book. Get your own copy from hxxp://ifreebooks.com/book/6295/ or your favorite torrent tracker.
-
Tutorials About Viruses
by CodeExplorer- 0 replies
- 6.9k views
Tutorials About Viruses Link download: http://www82.zippyshare.com/v/GFWYz9g2/file.html Tutorials list: (176 tutorials) 64-bit rugrats.pdf A Survey of Cryptologic Issues in Computer Virology.pdf Advanced Code Evolution Techniques and Computer Virus Generator Kits.pdf Advanced Metamorphic Techniques in Computer Viruses.pdf Advanced Polymorphic Techniques.pdf AGIS- Towards Automatic Generation of …
-
Reverse malware PDFs
by CodeExplorer- 0 replies
- 5.2k views
Reverse malware PDFs, Link: http://repo.hackerzvoice.net/depot_madchat/vxdevl/reverse/
-
VX Reversing I, the basics & VX Reversing II, Sasser.B
by CodeExplorer- 0 replies
- 5.1k views
VX Reversing I, the basics & VX Reversing II, Sasser.B: Tutorials about viruses. VX_Reversing_I&II.zip
-
Malware Forensics- Investigating and Analyzing Malicious Code
by CodeExplorer- 0 replies
- 5.5k views
Malware Forensics- Investigating and Analyzing Malicious Code Link download: http://www97.zippyshare.com/v/JZbv2iGo/file.html
-
Identifying Malicious Code Through Reverse Engineering
by CodeExplorer- 0 replies
- 5.6k views
Identifying Malicious Code Through Reverse Engineering Author: Sushil Jajodia Identifying Malicious Code Through Reverse Engineering.zip