Twitter Linkedin Youtube Mastodon
  • 5 The Quadrant, Coventry
  • contact@0ffset.net
0ffset Training Solutions
  • Home
  • Blog
  • Training
    • Zero2Automated
    • The Beginner Course
  • Company
  • Contact Us
0ffset Training Solutions
  • Home
  • Blog
  • Training
    • Zero2Automated
    • The Beginner Course
  • Company
  • Contact Us

Author: 0verfl0w_

  • Home
  • Blog
  • 0verfl0w_
Malware Analysis
_ 8th July 2019_ 0verfl0w__ 0 Comments

Analyzing KSL0T (Turla’s Keylogger), Part 2 – Reupload

(This post is a reupload from my old site which is no longer available – you may have seen it before) If you haven’t read the first post, go check it out here. You can download this keylogger off of VirusBay. So far we have decrypted a whole lot of text using a simple XOR method, which […]

LEARN MORE ♥
Malware Analysis
_ 8th July 2019_ 0verfl0w__ 0 Comments

Analyzing KSL0T (Turla’s Keylogger), Part 1 – Reupload

(This post is a reupload from my old site which is no longer available – you may have seen it before) Whilst I’m working through the Hancitor write up and the Flare On challenges, I decided to take a short break and focus on a smaller piece of malware – such as a keylogger, which […]

LEARN MORE ♥1
Malware Analysis Reverse Engineering
_ 25th May 2019_ 0verfl0w__ 1 Comment

Analyzing ISFB – The Second Loader

So it’s been quite a while since my last post, however now that my Beginner Malware Analysis Course is complete, the posts should be more and more frequent, although that obviously depends on the complexity of the samples I am analyzing. If you haven’t checked out my last post on ISFB where we analyzed the […]

LEARN MORE ♥
Malware Analysis
_ 13th March 2019_ 0verfl0w__ 2 Comments

Analysing ISFB – The First Loader

I’m finally getting round to writing this post – for the past few months I have been analysing different versions of ISFB/Ursnif/Gozi to gain a deeper understanding in the functionality of this specific malware. In this post, I will be detailing how to unpack and then analyse the first stage loader executable, and then use […]

LEARN MORE ♥
Malware Analysis
_ 5th February 2019_ 0verfl0w__ 4 Comments

Revisiting Hancitor in Depth

As you probably guessed from the title, we are going to be taking a look at Hancitor once again, except this time, I’ll be focusing on the second stage of Hancitor that is dropped as a result of a Microsoft Word or Excel document. I was planning to include an analysis of one of the […]

LEARN MORE ♥
Malware Analysis
_ 25th January 2019_ 0verfl0w__ 0 Comments

Analyzing the “New” Tools of DarkHydrus

You may remember I wrote about the DarkHydrus APT a while ago, and how their Powershell malware, RogueRobin, was being used to target Middle Eastern organizations and exfiltrate data through the usage of DNS. They have resurfaced after a dormant period, bringing an newly improved and compiled version of RogueRobin discovered by Unit 42, containing […]

LEARN MORE ♥
  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
Recent Posts
  • Identifying Cross References with Capstone Disassembler and PEFile
    30th April 2024
  • Resolving Stack Strings with Capstone Disassembler & Unicorn in Python
    10th April 2024
  • Python Opcode Obfuscation: A Powerful Anti-Analysis Technique
    18th June 2023

5 The Quadrant, Coventry, U.K.

Our Address

contact@0ffset.net

Our Mailbox

Copyright © 2022 0ffset Training Solutions LTD. All Rights Reserved.

Twitter Linkedin-in Youtube