Explore >> Select a destination


You are here

toddcullumresearch.com
| | x0rb3l.github.io
4.2 parsecs away

Travel
| | IntroductionIn this article I will be examining a Windows executable malware specimen. Based on a couple reports from automated malware sandboxes, the specimen drops multiple files to disk and calls out to multiple domains and IP addresses.The purpose of this article is to give readers a look into malware reverse engineering using static analysis, behavioral analysis, and code analysis. This is Part 1 of several more articles to come.The specimen in question is a Windows PE (Portable Executable) named setup.exe. You can find it's hashes below.MD5: d1b2c8ddca2f8dd02e2c132153055084SHA-1: 21c011ac7406eef048c175f5887e4eb885c050d6SHA256: 506c2f513d64242fcb20ccff8c26c0ed1755fe9120b984c29ba224b311d635c3I pulled this malware from Any.Run which contains nearly 75,000...
| | opguides.info
3.9 parsecs away

Travel
| | Chapter 35 - Reverse Engineering # Software # Anyone know of good resources for learning binary reversing? Not particular tools necessarily, but like theory and how to think @XMPPwocky on Twitter An Opinionated Guide on How To Reverse Engineer Software is decent. for me personally: know some assembly, and in particular make sure you know the calling conventions for your platform. when starting out, do it on binaries you can actually run in a debugger and see whats actually happening at runtime.
| | www.redblue.team
2.3 parsecs away

Travel
| | There's certainly no shortage of malware in Ukraine right now! One of my resolutions for the New Year is to spend more time conducting ...
| | www.govtech.com
18.7 parsecs away

Travel
| As artificial intelligence continues to evolve, how can public-sector teams prepare organizationally for the next generation of cyber attacks and equip themselves with the right tools?