Twitter Linkedin Youtube Mastodon
  • 5 The Quadrant, Coventry
  • [email protected]
0ffset Training Solutions
  • Home
  • Blog
  • Training
    • Zero2Automated
    • The Beginner Course
  • Company
  • Contact Us
0ffset Training Solutions
  • Home
  • Blog
  • Training
    • Zero2Automated
    • The Beginner Course
  • Company
  • Contact Us

Blog

  • Home
  • Blog
Malware Analysis Reverse Engineering
_ 27th May 2022_ Chuong Dong_ 0 Comments

BAZARLOADER: Analysing The Main Loader

This post is a follow up on the last one on BAZARLOADER. If you’re interested in how to unpack the initial stages of this malware, you can check it out here. In this post, we’ll cover the final stage of this loader, which has the capability to download and execute remote payloads such as Cobalt Strike and Conti ransomware.

LEARN MORE ♥1
Malware Analysis Reverse Engineering
_ 19th April 2022_ Chuong Dong_ 1 Comment

BAZARLOADER: Unpacking an ISO File Infection

BAZARLOADER (aka BAZARBACKDOOR) is a Windows-based loader that spreads through attachments in phishing emails. In this initial post, we will unpack the different stages of a BAZARLOADER infection that comes in the form of an optical disk image (ISO) file. We will also dive into the obfuscation methods used by the main BAZARLOADER payload.

LEARN MORE ♥
Malware Analysis Reverse Engineering
_ 15th February 2022_ Chuong Dong_ 0 Comments

MATANBUCHUS: Another Loader as a Service Malware

MATANBUCHUS is a loader-as-a-service that is used to download and launch malware on victim machines. It has been observed that the loader spreads through malicious Excel documents. In this post, we will focus on analyzing the latest loader DLL instead of the whole infection chain.

LEARN MORE ♥
Malware Analysis
_ 31st December 2021_ Chuong Dong_ 0 Comments

HANCITOR: Analysing The Main Loader

This post is a follow up for my last one on HANCITOR. If you haven’t checked it out, you can view it here. In this post, we’ll take a look at the main loader of this malware family, which is used for downloading and launching Cobalt Strike Beacon, information stealers, and malicious shellcode.

LEARN MORE ♥
Malware Analysis
_ 23rd November 2021_ Chuong Dong_ 0 Comments

HANCITOR: Analysing The Malicious Document

HANCITOR (aka CHANITOR) is a prevalent malware loader that spreads through social engineering in the form of Word or DocuSign® documents. The infected document includes instructions for the victim to manually allow the malicious macro code to be executed. The HANCITOR executable payload dropped by the macro code is used to download other malware on […]

LEARN MORE ♥1
Malware Analysis
_ 26th October 2021_ Chuong Dong_ 0 Comments

DRIDEX: Analysing API Obfuscation Through VEH

DRIDEX is one of the most famous and prevalent banking Trojans that dates back to around late 2014. Throughout its improvement and variations, DRIDEX has been successful in targeting the financial services sector to steal banking information and crucial user credentials. Typically, DRIDEX samples are delivered through phishing in the form of Word and Excel […]

LEARN MORE ♥
  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
Recent Posts
  • Identifying Cross References with Capstone Disassembler and PEFile
    30th April 2024
  • Resolving Stack Strings with Capstone Disassembler & Unicorn in Python
    10th April 2024
  • Python Opcode Obfuscation: A Powerful Anti-Analysis Technique
    18th June 2023

5 The Quadrant, Coventry, U.K.

Our Address

[email protected]

Our Mailbox

Copyright © 2022 0ffset Training Solutions LTD. All Rights Reserved.

Twitter Linkedin-in Youtube