Twitter Linkedin Youtube Mastodon
  • 5 The Quadrant, Coventry
  • contact@0ffset.net
0ffset Training Solutions
  • Home
  • Blog
  • Training
    • Zero2Automated
    • The Beginner Course
  • Company
  • Contact Us
0ffset Training Solutions
  • Home
  • Blog
  • Training
    • Zero2Automated
    • The Beginner Course
  • Company
  • Contact Us

Author: 0verfl0w_

  • Home
  • Blog
  • 0verfl0w_
Malware Development
_ 7th June 2018_ 0verfl0w__ 2 Comments

Understanding Malware #1

This is a new section I am starting, where instead of reverse engineering malware, I will be demonstrating how certain malware works, at a source code level. Whilst someone malicious could easily take all of the information and put it into their own malware, they would have wasted quite a lot of time, and are […]

LEARN MORE ♥
Malware Analysis
_ 5th June 2018_ 0verfl0w__ 2 Comments

Analyzing DanaBot’s Javascript Downloader

While I took a break from analyzing the two other Lazarus DLL’s, I decided to take a look at the downloader used to install DanaBot (A banking trojan) onto user’s systems, because a regular Javascript downloader isn’t that hard to analyze… right? I definitely have to give credit to whoever wrote the downloader because I […]

LEARN MORE ♥1
Malware Analysis
_ 1st June 2018_ 0verfl0w__ 0 Comments

Analyzing North Korean Malware – Joanap/Brambul Dropper

So you may have heard that the FBI have linked three strains of malware to a North Korean cybercrime group known as Lazarus (or HIDDEN COBRA, take your pick). The first strain is a Dropper (which is what I will be analyzing in this post) that contains two DLL’s (these are the other two strains): […]

LEARN MORE ♥1
Malware Analysis
_ 28th May 2018_ 0verfl0w__ 5 Comments

Analyzing a MuddyWater APT Sample

I recently had an extremely long plane trip, so I thought what better way to spend it then analyzing an extremely obfuscated, multi stage VBS/Powershell Backdoor? (Part 2 of the Graftor analysis was in the process of being written up, so I decided to focus my efforts on something that didn’t require an internet connection). […]

LEARN MORE ♥
Malware Analysis
_ 26th May 2018_ 0verfl0w__ 0 Comments

(Part 2): (Brief) Analysis of (Not) Adware.Graftor

If you haven’t read Part 1, this part might be a bit confusing  Upon further analysis and some cross referencing, I soon realized that the sample I was analyzing (at least the svchost injected process) was in fact a variant of Tofsee, rather than an adware variant of Graftor, I will explain why further on 🙂 I […]

LEARN MORE ♥
Malware Analysis
_ 18th May 2018_ 0verfl0w__ 0 Comments

(Part 1): Analysis of Adware.Graftor

Trying to keep up with regular posts, I found another malicious sample on VirusBay recently that I was quite interested in analyzing, mainly because it was 14.3 Megabytes large. Unless it was written in Python and compiled, I had no idea what it could be – so let’s find out! – As this malware randomized […]

LEARN MORE ♥
  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
Recent Posts
  • Identifying Cross References with Capstone Disassembler and PEFile
    30th April 2024
  • Resolving Stack Strings with Capstone Disassembler & Unicorn in Python
    10th April 2024
  • Python Opcode Obfuscation: A Powerful Anti-Analysis Technique
    18th June 2023

5 The Quadrant, Coventry, U.K.

Our Address

contact@0ffset.net

Our Mailbox

Copyright © 2022 0ffset Training Solutions LTD. All Rights Reserved.

Twitter Linkedin-in Youtube