Twitter Linkedin Youtube Mastodon
  • 5 The Quadrant, Coventry
  • contact@0ffset.net
0ffset Training Solutions
  • Home
  • Blog
  • Training
    • Zero2Automated
    • The Beginner Course
  • Company
  • Contact Us
0ffset Training Solutions
  • Home
  • Blog
  • Training
    • Zero2Automated
    • The Beginner Course
  • Company
  • Contact Us

Category: Reverse Engineering

  • Home
  • Blog
  • Reverse Engineering
Malware Analysis
_ 26th June 2018_ 0verfl0w__ 4 Comments

A Gh0st: Initialization Analysis

I was having a look at uploaded samples on VirusBay and noticed something quite peculiar. A user called Bondey had uploaded a sample and tagged it as Gh0stRAT. Gh0stRat is a remote access tool that has been used for quite a long time, and has had multiple variants and changes – but the RAT seemed to have disappeared for […]

LEARN MORE ♥
Malware Analysis
_ 9th June 2018_ 0verfl0w__ 0 Comments

“Karius”, a Work In Progress Banking Trojan

On June 7th, two variants of the same Banking Trojan were uploaded to VirusBay, and so I decided to have a look at them to see what exactly the difference was. The trojan I am referring to is known as Karius, which was discovered by a researcher at CheckPoint Software, Israel Gubi (@israel_gubi), and you can […]

LEARN MORE ♥
Malware Analysis
_ 5th June 2018_ 0verfl0w__ 2 Comments

Analyzing DanaBot’s Javascript Downloader

While I took a break from analyzing the two other Lazarus DLL’s, I decided to take a look at the downloader used to install DanaBot (A banking trojan) onto user’s systems, because a regular Javascript downloader isn’t that hard to analyze… right? I definitely have to give credit to whoever wrote the downloader because I […]

LEARN MORE ♥1
Malware Analysis
_ 1st June 2018_ 0verfl0w__ 0 Comments

Analyzing North Korean Malware – Joanap/Brambul Dropper

So you may have heard that the FBI have linked three strains of malware to a North Korean cybercrime group known as Lazarus (or HIDDEN COBRA, take your pick). The first strain is a Dropper (which is what I will be analyzing in this post) that contains two DLL’s (these are the other two strains): […]

LEARN MORE ♥1
Malware Analysis
_ 28th May 2018_ 0verfl0w__ 5 Comments

Analyzing a MuddyWater APT Sample

I recently had an extremely long plane trip, so I thought what better way to spend it then analyzing an extremely obfuscated, multi stage VBS/Powershell Backdoor? (Part 2 of the Graftor analysis was in the process of being written up, so I decided to focus my efforts on something that didn’t require an internet connection). […]

LEARN MORE ♥
Malware Analysis
_ 26th May 2018_ 0verfl0w__ 0 Comments

(Part 2): (Brief) Analysis of (Not) Adware.Graftor

If you haven’t read Part 1, this part might be a bit confusing  Upon further analysis and some cross referencing, I soon realized that the sample I was analyzing (at least the svchost injected process) was in fact a variant of Tofsee, rather than an adware variant of Graftor, I will explain why further on 🙂 I […]

LEARN MORE ♥
  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
Recent Posts
  • Identifying Cross References with Capstone Disassembler and PEFile
    30th April 2024
  • Resolving Stack Strings with Capstone Disassembler & Unicorn in Python
    10th April 2024
  • Python Opcode Obfuscation: A Powerful Anti-Analysis Technique
    18th June 2023

5 The Quadrant, Coventry, U.K.

Our Address

contact@0ffset.net

Our Mailbox

Copyright © 2022 0ffset Training Solutions LTD. All Rights Reserved.

Twitter Linkedin-in Youtube