MuddyWater is an APT group that has been active throughout 2017, targeting victims in the Middle East with in-memory vectors leveraging on Powershell.
In October 2018, Kaspersky Lab has already published a good analysis report on the malwares by this APT group.
Here I am publishing...
This is all about malware analysis, reverse engineering and some cool stuff
Friday, 11 January 2019
Monday, 1 October 2018
Flare-On Challenge 2018 Writeup
Flare-on is an annual CTF challenge organized by Fire-eye with a focus on reverse engineering.
Overall, there were 12 challenges to complete similar to the last year 2017. Instead of the detailed write-up, I am just covering the important parts.
Following are the instructions to solve these challenges:
1....
Wednesday, 13 December 2017
Analysis of Noblis In-dev Ransomware
Noblis is in-development ransomware which is built in python and packed by PyInstaller.
You can refer my previous blog to know how to identify and reverse python built execuctables.
We have following sample:
Hash : 3BEEE8D7F55CD8298FCB009AA6EF6AAE [App.Any]
The sample is UPX packed, after unpacking...
Monday, 11 December 2017
Analysis of File-Spider Ransomware
December 11, 2017
Posted by SDKHERE
FileSpider, MS Word, MSIL, PowerShell, Ransomware, Spider
1 comment
MD5: de7b31517d5963aefe70860d83ce83b9 [VirusTotal]
FileName: BAYER_CROPSCIENCE_OFFICE_BEOGRAD_93876.doc
FileType: MS Word Document
The Word file has embedded macro.
When you look into macro code, you will find below snippet.
Private Function decodeBase64(ByVal strData As String) As Byte()
Dim...