This blog post was authored by @hasherezade, with contributions from @siri_urz and Jérôme Segura. Security firm Proofpoint recently published a report…
Tag: malware analysis
Analyzing a new stealer written in Golang
Golang (Go) is a relatively new programming language, and it is not common to find malware written in it. However, new…
Malware analysis: decoding Emotet, part 1
Emotet Banking Trojan malware has been around for quite some time now. As such, infosec researchers have made several attempts to…
Spartacus ransomware: introduction to a strain of unsophisticated malware
Spartacus ransomware is a new sample that has been circulating in 2018. Written in C#, the original sample is obfuscated, which…
An in-depth malware analysis of QuantLoader
This guest post is written by Vishal Thakur, CSIRT/Salesforce. For more on Vishal, read his bio at the end of the…
A coin miner with a “Heaven’s Gate”
You might call the last two years the years of ransomware. Ransomware was, without a doubt, the most popular type of…
Complex Method of Obfuscation Found in Dropper RealShell
The fight against malware is never-ending for a threat researcher, and in the mobile malware arena the fight is becoming more…
Five PE Analysis Tools Worth Looking At
In the world of malware analysis, having the right tools can make all the difference. When looking at malicious binaries, they…
Malware with Packer Deception Techniques
As we’ve discussed on our blog several times, malware will make use of commercially available or “homebrewed” packers or cryptors to…
Malicious Messages Foray Facebook
In yet another method for cyber criminals to utilize the world’s most popular social networks for their own nefarious purposes, it…