#Kesakode updated to 1.0.45 !
● New malware entries: Fullmetal, Laplas, RoningLoader, ShadowRat, Silentsweeper and SystemShock
● Updated malware entries: 29
● FP-fixed signatures: 931
● 16587 new clean programs whitelisted
● 3452882 new functions
● 165257 new strings
16.11.2025 09:19 — 👍 0 🔁 0 💬 0 📌 0
#kesakode DB update to 1.0.43, with again a focus on the clean set:
● 18 new malware entries
● 53 existing entries updated
● FP-fixed signatures: 749
● 5280 new clean programs whitelisted
● +2M unique functions
● +300K unique strings
02.11.2025 08:07 — 👍 1 🔁 0 💬 0 📌 0
#kesakode updated to 1.0.42:
* New entries: Brickstorm, Butoflex, Ladvix, NetStar, Pantegana, Tendyron, Tsunamikit and VampireBot
* Updated entries: AuraStealer, Latrodectus, NightshadeC2 and QNAPCrypt
* 33275 new clean programs whitelisted
* FP-fixed signatures: 1028
21.10.2025 09:27 — 👍 0 🔁 0 💬 0 📌 0
#Kesakode updated to 1.0.41:
Malware signatures:
* New malware entries: 14
* Updated malware entries: 16
* FP-fixed signatures: 1340
Files:
* 33 new malicious samples
* 52010 new clean programs
Database:
* 13093705 new unique functions
* 7778950 new unique strings
14.10.2025 05:29 — 👍 0 🔁 0 💬 0 📌 0
#Malcat tip #10: analysing backdoored clean software can be hard.
A quick win is to pivot around known constants, thanks to Malcat's 400k+ constants DB (here a #Tropidoor dlder):
25.09.2025 09:54 — 👍 1 🔁 0 💬 0 📌 0
Tomorrow at BSides Edmonton! 🔥
22.09.2025 22:45 — 👍 1 🔁 1 💬 0 📌 0
Updated #Kesakode to 1.0.39:
* New malware entries: HybridPetya, MostereRAT, PhantomStealer, SatanLockV2 and Yurei
* Updated malware entries: 38
* 3285 new library objects seen
* 2622 new clean programs whitelisted
* 905652 new unique functions
* 1330028 new unique strings
22.09.2025 07:24 — 👍 0 🔁 0 💬 0 📌 0
YouTube video
Malcat : First Steps
First steps with #malcat? Here is a tutorial video, courtesy of
@invokereversing.bsky.social :
www.youtube.com/watch?v=gqES...
18.09.2025 07:53 — 👍 2 🔁 2 💬 0 📌 0
Updated #kesakode to 1.0.38:
Malware signatures:
* New malware entries: 20 new families
* 564116 new unique functions
* 197608 new unique strings
* 27 new unique constant fingerprints
12.09.2025 06:52 — 👍 1 🔁 0 💬 0 📌 0
RationalEdge - Intelligence Meets Accuracy
Advanced malware analysis and threat intelligence solutions by RationalEdge
TL;DR I am launching my #startup and we are going to change how to evaluate,cluster and reason about #malware, delivering accurate,contextual intelligence on samples. Say Hi to RationalEdge
@rationaledge.bsky.social
rationaledge.io
#threatintel #threathunting #cti #reverseengineering #detection 1/9
28.08.2025 12:22 — 👍 24 🔁 14 💬 2 📌 0
YouTube video by Invoke RE
Triaging Malware with Malcat (Stream - 29/07/2025)
We've uploaded our stream from July 28th where we triaged an Emotet infection chain with Renaud from @malcat4ever.bsky.social Enjoy! www.youtube.com/watch?v=xJof...
15.08.2025 14:19 — 👍 1 🔁 1 💬 0 📌 0
#Kesakode DB has been updated to 1.0.36 !
* 9 new malware families
* 70 extended malware signatures
* 37 new malicious samples in database
* 11440 new library objects seen
* 120k new clean programs whitelisted
* 17M new unique functions
* 3M new unique strings
24.07.2025 19:26 — 👍 0 🔁 0 💬 0 📌 0
#Kesakode has been updated to 1.0.34!
* 34 new malware entries
* 249 extended malware signatures
* 50 new malicious samples in database
* 58950 new clean programs whitelisted
* 5459056 new unique functions
* 1862336 new unique strings
10.07.2025 09:50 — 👍 1 🔁 0 💬 0 📌 0
Does someone know this #malware, since this is definitely NOT latrodectus. Looks like some Discord-backed infostealer:
bazaar.abuse.ch/sample/85f8c...
01.06.2025 09:35 — 👍 0 🔁 0 💬 0 📌 0
You can now check your strings in #malcat against an online library of #Malpedia FLOSSed strings. Just copy this plugin:
github.com/malpedia/mal...
27.05.2025 07:52 — 👍 0 🔁 0 💬 0 📌 0
Learn How to Dissect Binary Files with the Creator of Malcat!
Malcat is a powerful binary file dissector that's essential for Windows and Linux IT-security professionals. As both a feature-rich hexadecimal editor and a ...
🚀 Malcat is a powerful binary file dissector that's essential for Windows and Linux IT-security professionals. As both a feature-rich hexadecimal editor and a disassembler, Malcat offers a comprehensive toolkit for in-depth binary analysis. Check it out 👇
www.youtube.com/live/yzC_539...
09.05.2025 17:06 — 👍 3 🔁 1 💬 0 📌 0
Sticking to your "Goldoon" example, does your result table (7) only consider artifacts from the downloader part? If yes (hard to know, but it looks like it), this is a 13kb tiny downloader, it's definitely not worth 4-5 days of analysis. A couple of hours maybe. And I'm being pessimistic.
22.04.2025 10:09 — 👍 0 🔁 0 💬 1 📌 0
then how do you quickly confirm the AI assertion without input/output testing? It may be a sha256 variant. You know well malware authors like to modify standard algorithms.
If it's just saying "it looks like sha256", it's also very quick to say without AI:
22.04.2025 09:49 — 👍 0 🔁 0 💬 1 📌 0
Give the same task to the same person (or another evenly skilled one) with and without AI. Repeat with a few other malware analysts.
Bonus points if the task has clearly defined results, e.g. "extract the C2 url", "what files are modified", list all C2 commands, what encryption is used, etc.
22.04.2025 09:34 — 👍 0 🔁 0 💬 1 📌 0
Humans may not report things because of time constraints or just plain lazyness (more to write). And even if not, "interesting" is subjective. You've found it interesting, maybe the original blog author did not.
22.04.2025 08:46 — 👍 0 🔁 0 💬 0 📌 0
For instance for Goldoon, my estimate for the blog post would be 12 hours from sample to finished article (I worked for an AV company, I have an idea how little they value such minimal blog posts).
My estimation for instance would change the conclusion of your paper. That's why estimations are bad.
22.04.2025 08:31 — 👍 0 🔁 0 💬 3 📌 0
And don't get me wrong, your comparison of LLM engine is very pertinent and useful for instance. I'm just talking about the speed claim.
22.04.2025 08:17 — 👍 0 🔁 0 💬 0 📌 0
You have not convinced me for now, but I'm open for discussion. This is sure a complex topic to evaluate.
22.04.2025 08:13 — 👍 0 🔁 0 💬 3 📌 0
Not to mention you have to know WHERE to debug, which means you already have down some basic RE work.
22.04.2025 08:12 — 👍 0 🔁 0 💬 1 📌 0
You could have asked the blog authors maybe?
The only point of comparison you give for non-AI work is your own estimation. Since you format your paper in 2 columns and post it on arxiv, I thought you wanted to make it look scientific, and "according to my own estimation" is not very scientific.
22.04.2025 08:10 — 👍 0 🔁 0 💬 1 📌 0
Reverse engineer, file formats expert.
Corkami, CPS2Shock, PoC||GTFO, Sha1tered, Magika...
Security engineer @ Google. He/him.
Malware analysis can be hard, but learning it shouldn’t be.
https://training.invokere.com
Computer history. Reverse-engineering old chips. Restored Apollo Guidance Computer, Alto. Ex-Google, Sun, Msft. So-called boffin.
Sr. Director of Technical Analysis @ Recorded Future
Malware, ai, data, and coffee.
@idr0p@infosec.exchange
Food, Sport, DFIR, in that order!
Reverse engineer at FLARE/Google | Pluralsight author | 😱 1M+ views on YT | 🎙️ Host of Behind the Binary podcast 👇
Founder @ RationalEdge
#ThreatIntel #ICS #DFIR; ''Learning iOS Forensics'' author;
#BSidesZH #PIVOTcon org.
@pivotcon.bsky.social
https://pstirparo.ch
https://rationaledge.io
Related interests/obsessions:
#ThreatHunting #CTI #YARA #CriticalThinking #Books
"Distrust and caution are the parents of security." - Benjamin Franklin
https://malwaremaloney.blogspot.com
Welcome,this account is devoted high-quality image of space,sharing quality astrophotography science &Technology
Join my x page https://x.com/Earthwonders__/status/1984066212582801872?t=gkF8RDYsJuj9w95viDa5gg&s=19
Security research and breaking news straight from ESET Research Labs.
welivesecurity.com/research/
Military-grade reverse engineer @ Google, working on Android malware
Got mistaken for a member of Project Zero once.
Everything here is my own opinion
he/him ✨🌈🦄
BleepingComputer is a premier destination for cybersecurity news for over 20 years, delivering breaking stories on the latest hacks, malware threats, and […]
🌉 bridged from 🌐 https://bleepingcomputer.com/: https://fed.brid.gy/web/bleepingcomputer.com
The largest collection of malware source code, samples, and papers on the internet.
Password: infected
(unofficial, this is a bot! Maintained by @yjb.bsky.social, the bot can't handle retweets, video, and maybe a few other things)