Twitter Linkedin Youtube Mastodon
  • 5 The Quadrant, Coventry
  • contact@0ffset.net
0ffset Training Solutions
  • Home
  • Blog
  • Training
    • Zero2Automated
    • The Beginner Course
  • Company
  • Contact Us
0ffset Training Solutions
  • Home
  • Blog
  • Training
    • Zero2Automated
    • The Beginner Course
  • Company
  • Contact Us

Author: 0verfl0w_

  • Home
  • Blog
  • 0verfl0w_
Reverse Engineering
_ 15th January 2019_ 0verfl0w__ 4 Comments

Analyzing COMmunication in Malware

If you follow me on Twitter (@0verfl0w_), you may have noticed a while back that I was analyzing a sample of Ursnif/Gozi/ISFB (which I will refer to as ISFB) and was confused as to how it was able to communicate with its C2 servers through a separate process, without injected DLL’s or process hollowing. I […]

LEARN MORE ♥3
Miscellaneous
_ 3rd January 2019_ 0verfl0w__ 2 Comments

Setting Up a Safe Malware Analysis Environment

Carrying on with the previous post of getting started with malware analysis (you can find it here), I’ve had requests to do a write up on how I setup my environment for analysis. This guide is also helpful for those of you running a one laptop setup, because that’s what I’m currently using! Obviously you’ll […]

LEARN MORE ♥5
Miscellaneous
_ 3rd January 2019_ 0verfl0w__ 6 Comments

How to get started with Malware Analysis

So it’s been a while since I last posted anything – I’ve been extremely busy with exam season coming up, but I had a bit of spare time so I decided to post something. Expect more regular posts over the holidays, and I hope to revamp the website a bit so it looks cleaner (and […]

LEARN MORE ♥9
CTF/Challenges
_ 3rd January 2019_ 0verfl0w__ 0 Comments

Solving MalwareTech’s RE Challenges: Strings

I’ve been wanting to post write-ups about different CTF’s and challenges that I have done, and I’m finally getting round to doing it. And as I’ve been recommended to use Cutter when performing Static Analysis, I decided to kick of the challenge section with some of MalwareTech’s static RE challenges, which you can find here. […]

LEARN MORE ♥6
Malware Analysis
_ 3rd January 2019_ 0verfl0w__ 1 Comment

Hancitor MalSpam – Stage 2

If you haven’t seen my last post about Hancitor, check it out here as I explain how this binary gets onto your machine through a malicious word document. As always, you can download this sample – both the document and embedded binary – on VirusBay. Let’s begin the analysis! MD5 of Sample: 992f079a832820c61388f753dab1114d I have only had a brief […]

LEARN MORE ♥5
Malware Analysis
_ 3rd January 2019_ 0verfl0w__ 1 Comment

Hancitor MalSpam – Stage 1

Recently, TechHelpList uploaded a Hancitor Word document to VirusBay, along with an overview of the sites it reached out to, the C2 servers, and the payloads that were dropped by said document. As it seems Hancitor is quite popular for downloading the Pony and ZeusPanda malware (what is it with animals and malware?), I decided to […]

LEARN MORE ♥7
  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
Recent Posts
  • Identifying Cross References with Capstone Disassembler and PEFile
    30th April 2024
  • Resolving Stack Strings with Capstone Disassembler & Unicorn in Python
    10th April 2024
  • Python Opcode Obfuscation: A Powerful Anti-Analysis Technique
    18th June 2023

5 The Quadrant, Coventry, U.K.

Our Address

contact@0ffset.net

Our Mailbox

Copyright © 2022 0ffset Training Solutions LTD. All Rights Reserved.

Twitter Linkedin-in Youtube