Twitter Linkedin Youtube Mastodon
  • 5 The Quadrant, Coventry
  • contact@0ffset.net
0ffset Training Solutions
  • Home
  • Blog
  • Training
    • Zero2Automated
    • The Beginner Course
  • Company
  • Contact Us
0ffset Training Solutions
  • Home
  • Blog
  • Training
    • Zero2Automated
    • The Beginner Course
  • Company
  • Contact Us

Blog

  • Home
  • Blog
Malware Analysis Reverse Engineering
_ 25th May 2019_ 0verfl0w__ 1 Comment

Analyzing ISFB – The Second Loader

So it’s been quite a while since my last post, however now that my Beginner Malware Analysis Course is complete, the posts should be more and more frequent, although that obviously depends on the complexity of the samples I am analyzing. If you haven’t checked out my last post on ISFB where we analyzed the […]

LEARN MORE ♥
Malware Analysis
_ 13th March 2019_ 0verfl0w__ 2 Comments

Analysing ISFB – The First Loader

I’m finally getting round to writing this post – for the past few months I have been analysing different versions of ISFB/Ursnif/Gozi to gain a deeper understanding in the functionality of this specific malware. In this post, I will be detailing how to unpack and then analyse the first stage loader executable, and then use […]

LEARN MORE ♥
Malware Analysis
_ 5th February 2019_ 0verfl0w__ 4 Comments

Revisiting Hancitor in Depth

As you probably guessed from the title, we are going to be taking a look at Hancitor once again, except this time, I’ll be focusing on the second stage of Hancitor that is dropped as a result of a Microsoft Word or Excel document. I was planning to include an analysis of one of the […]

LEARN MORE ♥
Malware Analysis
_ 25th January 2019_ 0verfl0w__ 0 Comments

Analyzing the “New” Tools of DarkHydrus

You may remember I wrote about the DarkHydrus APT a while ago, and how their Powershell malware, RogueRobin, was being used to target Middle Eastern organizations and exfiltrate data through the usage of DNS. They have resurfaced after a dormant period, bringing an newly improved and compiled version of RogueRobin discovered by Unit 42, containing […]

LEARN MORE ♥
Reverse Engineering
_ 15th January 2019_ 0verfl0w__ 4 Comments

Analyzing COMmunication in Malware

If you follow me on Twitter (@0verfl0w_), you may have noticed a while back that I was analyzing a sample of Ursnif/Gozi/ISFB (which I will refer to as ISFB) and was confused as to how it was able to communicate with its C2 servers through a separate process, without injected DLL’s or process hollowing. I […]

LEARN MORE ♥
Miscellaneous
_ 3rd January 2019_ 0verfl0w__ 2 Comments

Setting Up a Safe Malware Analysis Environment

Carrying on with the previous post of getting started with malware analysis (you can find it here), I’ve had requests to do a write up on how I setup my environment for analysis. This guide is also helpful for those of you running a one laptop setup, because that’s what I’m currently using! Obviously you’ll […]

LEARN MORE ♥
  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
Recent Posts
  • Identifying Cross References with Capstone Disassembler and PEFile
    30th April 2024
  • Resolving Stack Strings with Capstone Disassembler & Unicorn in Python
    10th April 2024
  • Python Opcode Obfuscation: A Powerful Anti-Analysis Technique
    18th June 2023

5 The Quadrant, Coventry, U.K.

Our Address

contact@0ffset.net

Our Mailbox

Copyright © 2022 0ffset Training Solutions LTD. All Rights Reserved.

Twitter Linkedin-in Youtube