Malware

Capa v7.3.0 – Enhanced Malware Analysis With VMRay Integration, Ghidra Support, And New Capa Rules Website

The v7.3.0 capa release comes with the following three major enhancements: 1. Support For VMRay Sandbox Analysis Archives Unlock powerful…

2 months ago

Prince Ransomware – A New Threat In Cybersecurity

Prince now has a Windows Defender flag, namely "Ransom:Win64/PrinceRansom.YAA!MTB". This means that Prince Ransomware will no longer bypass Windows Defender…

2 months ago

Process Injection Techniques – For Advanced Adversary Emulation

Usman Sikander (a.k.a Offensive-Panda) is a seasoned security professional specializing in adversary emulation, malware development, malware analysis, and red teaming.…

2 months ago

SharpIncrease – Mastering Malware Obfuscation To Bypass Security Detection

Adversaries may use binary padding to add junk data and change the on-disk representation of malware. This can be done…

5 months ago

T1036.005 – Masquerading : Match Legitimate Name Or Location

In the cybersecurity landscape, attackers constantly devise methods to bypass security measures. One sophisticated technique is T1036.005, or Masquerading: Match…

7 months ago

ChaiLdr – AV Evasive Payload Loader : Unveiling Next-Gen Evasion Capabilities

ChaiLdr - AV Evasive Payload Loader represents a cutting-edge approach in malware development, blending innovative evasion techniques to bypass modern…

8 months ago

Banshee – A Foray Into Kernel-Level Power With Rootkit Techniques

Learning about Windows rootkits lately, so here is my own implementation of some techniques. For an overview, see Features below. Banshee is…

8 months ago

Awesome Malware Analysis – The Ultimate Resource For Tools, Techniques, And Insights

A curated list of awesome malware analysis tools and resources. Inspired by awesome-python and awesome-php. Malware Collection Anonymizers Honeypots Malware Corpora Open Source…

8 months ago

Anti-Qakbot – Disabling The Malicious Threat

Kill a live running QAKbot on an infected machine. More on this : Operation Duckhunt : Field Testing the FBI’s Anti-Qakbot…

1 year ago

What are the Types of Malware Infecting Your Computer

Malware is a malicious computer program that is designed to infect your system and gain access to sensitive information without…

5 years ago