This is all about malware analysis, reverse engineering and some cool stuff

Friday, 11 January 2019

A new MuddyWater APT campaign spreads Backdoor RAT

January 11, 2019 Posted by SDKHERE , , , , , , No comments
MuddyWater is an APT group that has been active throughout 2017, targeting victims in the Middle East with in-memory vectors leveraging on Powershell. In October 2018, Kaspersky Lab has already published a good analysis report on the malwares by this APT group. Here I am publishing...

Monday, 1 October 2018

Flare-On Challenge 2018 Writeup

October 01, 2018 Posted by SDKHERE No comments
Flare-on is an annual CTF challenge organized by Fire-eye with a focus on reverse engineering. Overall, there were 12 challenges to complete similar to the last year 2017. Instead of the detailed write-up, I am just covering the important parts. Following are the instructions to solve these challenges: 1....

Wednesday, 13 December 2017

Analysis of Noblis In-dev Ransomware

December 13, 2017 Posted by SDKHERE , , , No comments
Noblis is in-development ransomware which is built in python and packed by PyInstaller. You can refer my previous blog to know how to identify and reverse python built execuctables. We have following sample: Hash : 3BEEE8D7F55CD8298FCB009AA6EF6AAE [App.Any] The sample is UPX packed, after unpacking...

Monday, 11 December 2017

Analysis of File-Spider Ransomware

December 11, 2017 Posted by SDKHERE , , , , , 1 comment
MD5: de7b31517d5963aefe70860d83ce83b9 [VirusTotal] FileName: BAYER_CROPSCIENCE_OFFICE_BEOGRAD_93876.doc FileType: MS Word Document The Word file has embedded macro. When you look into macro code, you will find below snippet. Private Function decodeBase64(ByVal strData As String) As Byte() Dim...