's Avatar

@hasherezade.bsky.social

Programmer, #malware analyst. Author of #PEbear, #PEsieve, #TinyTracer. Private account. All opinions expressed here are mine only (not of my employer etc) ; https://hasherezade.net

1,470 Followers  |  72 Following  |  19 Posts  |  Joined: 13.11.2024  |  1.6775

Latest posts by hasherezade.bsky.social on Bluesky


Preview
Flare-On 12 – Task 8 In this mini-series I describe the solutions of my favorite tasks from this year’s Flare-On competition. To those of you who are not familiar, Flare-On is a marathon of reverse engineering. This ye…

And #FlareOn12 Task 8: wp.me/p2mVNF-2Qf

27.11.2025 21:55 β€” πŸ‘ 8    πŸ” 2    πŸ’¬ 0    πŸ“Œ 0
Preview
Flare-On 12 – Task 8 In this mini-series I describe the solutions of my favorite tasks from this year’s Flare-On competition. To those of you who are not familiar, Flare-On is a marathon of reverse engineering. This ye…

And #FlareOn12 Task 8: wp.me/p2mVNF-2Qf

27.11.2025 21:55 β€” πŸ‘ 8    πŸ” 2    πŸ’¬ 0    πŸ“Œ 0
Preview
Flare-On 12 – Task 9 In this mini-series I describe the solutions of my favorite tasks from this year’s Flare-On competition. To those of you who are not familiar, Flare-On is a marathon of reverse engineering. T…

Long overdue, but here’s my writeup for #FlareOn12 Task 9: hshrzd.wordpress.com/2025/11/20/f...

20.11.2025 05:28 β€” πŸ‘ 12    πŸ” 2    πŸ’¬ 1    πŸ“Œ 0
Post image

Heeey, ncurses/terminfo has a small virtual machine! And if there's a VM, there are CTF challenges :)
hackarcana.com/public-exerc...
hackarcana.com/public-exerc...
(third one coming next week, will be a bit harder)

01.11.2025 16:15 β€” πŸ‘ 17    πŸ” 7    πŸ’¬ 0    πŸ“Œ 0
Preview
The 13th Annual Volatility Plugin Contest is Open! We are excited to announce that the Volatility Plugin ContestΒ is officially open for submissions! The annual Plugin Contest is your opportunity to: Directly contribute to the open source forensics …

The 13th annual @volatility #PluginContest is OPEN for submissions until 31 Dec 2025!

This contest is designed to encourage research & development in the field of #memoryanalysis. Every year, contributions from all around the world continue to help build the next generation of #memoryforensics.

29.10.2025 15:37 β€” πŸ‘ 1    πŸ” 4    πŸ’¬ 0    πŸ“Œ 4
Post image

-iOS 26 change deletes clues of old spyware infections
-Starlink disables 2.5k scam compound terminals
-Caribbean hospital still down 5 months after ransomware attack
-Poland charges officials in Pegasus scandal

Newsletter: news.risky.biz/risky-bullet...
Podcast: risky.biz/RBNEWS495/

24.10.2025 07:18 β€” πŸ‘ 20    πŸ” 11    πŸ’¬ 1    πŸ“Œ 2
Preview
β€ŽHacktivate: Capture the Flag β€ŽCrack codes. Break firewalls. Conquer the map. Hacktivate is the ultimate cybersecurity challenge: a world map of 240 missions where every puzzle is built on real cybersecurity techniques hackers us...

Today I'm launching my new app, Hacktivate. It teaches real-world computer science skills through 240 "capture the flag" challenges, and works on iPhone, iPad, and Mac with one purchase. I've poured a ton of love into it, and I'd love to hear what you think πŸ™Œ apps.apple.com/gb/app/hackt...

22.10.2025 13:20 β€” πŸ‘ 156    πŸ” 30    πŸ’¬ 18    πŸ“Œ 0
Video thumbnail

I used PE-bear for the first time to dump an embedded binary. Its intuitive UI made extraction effortless. Because malware often embeds payloads with the form A in B to evade detection, pulling out the inner binary was crucial for deeper analysis and IoCs hunting.

19.10.2025 08:45 β€” πŸ‘ 2    πŸ” 2    πŸ’¬ 2    πŸ“Œ 0
Post image

Finally done with #FlareOn12. What a ride! I am looking forward to read other people’s solutions, especially of those who did the 9th task quickly.

11.10.2025 16:26 β€” πŸ‘ 9    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0
Post image

#FTSCon Speaker Spotlight: Aleksandra Doniec (@hasherezade.bsky.social) is presenting β€œUncovering Malware's Secrets with TinyTracer” in the MAKER track.

See the full list of speakers + event info, including how to register, here: volatilityfoundation.org/from-the-sou...

18.09.2025 18:10 β€” πŸ‘ 2    πŸ” 6    πŸ’¬ 0    πŸ“Œ 0
Preview
Malware Analysis - Intermediate Level Signature writing, deobfuscation, dynamic API resolving, syscalls, hooking, shellcode analysis and more

My intermediate level malware analysis course is there.
60% off for the next two weeks.

malwareanalysis-for-hedgehogs.learnworlds.com/course/inter...

01.09.2025 15:17 β€” πŸ‘ 9    πŸ” 6    πŸ’¬ 1    πŸ“Œ 0

Beyond good ol’ Run key, Part 148

www.hexacorn.com/blog/2025/07...

05.07.2025 23:44 β€” πŸ‘ 5    πŸ” 1    πŸ’¬ 0    πŸ“Œ 0
Post image

- option of custom parsing exports directory allows to pinpoint even the APIs that the malware author tried to hide by erasing exports table in memory: (github.com/hasherezade/...)

06.06.2025 19:18 β€” πŸ‘ 3    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0
Post image

- watching not only the functions arguments, but also, how they changed after the function execution, and the function return value: (github.com/hasherezade/...) - thanks to a new contributor, maxspl:

06.06.2025 19:17 β€” πŸ‘ 3    πŸ” 0    πŸ’¬ 1    πŸ“Œ 0
Post image Post image

includes: tracing defined local functions (github.com/hasherezade/...):

06.06.2025 19:15 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 1    πŸ“Œ 0
Post image

New #TinyTracer (v3.0) is out - with many cool features: github.com/hasherezade/... - check them out!

06.06.2025 19:11 β€” πŸ‘ 16    πŸ” 6    πŸ’¬ 1    πŸ“Œ 0

1. Pause thread midway in exploit races (even β“ͺ).
2. Or block entire CPU core. Kernel APCs run at APC_LEVEL (🀯), so thread scheduling kinda disabled (think priority == ∞).
3. Or build upon @hasherezade.bsky.social work & generalize #WaitingThreadHijacking β€” making it, in fact, Waitless.

06.05.2025 22:06 β€” πŸ‘ 2    πŸ” 1    πŸ’¬ 0    πŸ“Œ 0
Screenshot of contextjail.exe running with default arguments.


Highlighted:

* prisoner thread (latched to CPU1 with priority 15) couldn't run for the entire test duration (30 seconds).

* 99 jailer threads (latched to 6/8 processors, CPU2..CPU7) were using 20% of total CPU time.


Overlay: pseudo-ASSCII art with prisoner thread and 6 jailer threads (guards), spamming NtGetContextThread to block the prisoner.


Source and compiled binary:
https://pastebin.com/pBJcGp1y

Screenshot of contextjail.exe running with default arguments. Highlighted: * prisoner thread (latched to CPU1 with priority 15) couldn't run for the entire test duration (30 seconds). * 99 jailer threads (latched to 6/8 processors, CPU2..CPU7) were using 20% of total CPU time. Overlay: pseudo-ASSCII art with prisoner thread and 6 jailer threads (guards), spamming NtGetContextThread to block the prisoner. Source and compiled binary: https://pastebin.com/pBJcGp1y

Heard of #ContextJail?
It's a nasty new technique: puts target thread into β“ͺ deadloop, for as long as you can afford. Requires THREAD_GET_CONTEXT right.

The gist? Just spam NtGetContextThread(tgt).😸
Target will be jailed, running nt!PspGetSetContextSpecialApc πŸ”.

Src & binary in [ALT].

Usecases: ‡️

06.05.2025 22:06 β€” πŸ‘ 7    πŸ” 6    πŸ’¬ 1    πŸ“Œ 0

yes, we catch it, but I cannot speak for others

14.04.2025 18:59 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0
[DEMO] Waiting Thread Hijacking (on Windows 11 24 H2)
YouTube video by hasherezade [DEMO] Waiting Thread Hijacking (on Windows 11 24 H2)

demo: www.youtube.com/watch?v=CZIR... ; src: github.com/hasherezade/...

14.04.2025 18:18 β€” πŸ‘ 5    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0
Preview
Waiting Thread Hijacking: A Stealthier Version of Thread Execution Hijacking - Check Point Research Research by: hasherezade Key Points Introduction Process injection is one of theΒ important techniques used by attackers. We can find its variants implemented in almost every malware. It serves purpose...

My new blog for CPR: introducing Waiting Thread Hijacking - a remote process injection technique targeting waiting threads: research.checkpoint.com/2025/waiting... #ProcessInjection

14.04.2025 18:17 β€” πŸ‘ 15    πŸ” 10    πŸ’¬ 3    πŸ“Œ 0

πŸ«‚

13.04.2025 21:57 β€” πŸ‘ 1    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0
Preview
New HijackLoader Evasion Tactics | ThreatLabz Learn how HijackLoader has introduced call stack spoofing and new modules to improve its evasion and anti-analysis capabilities.

Zscaler has published a technical report on HijackLoader (IDAT Loader, GhostPulse) and its recent changes, such as its new call stack spoofing module, anti-VM module, and support for scheduled task persistence

www.zscaler.com/blogs/securi...

01.04.2025 10:31 β€” πŸ‘ 10    πŸ” 4    πŸ’¬ 1    πŸ“Œ 0

Abolish April Fool’s day. Society has moved past the need for April Fool’s day

01.04.2025 02:36 β€” πŸ‘ 13366    πŸ” 1549    πŸ’¬ 540    πŸ“Œ 169
Preview
Hellcat Hacking Group Unmasked: Investigating Rey and Pryx | KELA Cyber KELA’s latest research uncovers key insights into two key threat actors of Hellcat Group, Pryx and Rey. Read more.

KELA has published a profile on Rey and Pryx, the two main individuals behind the Hellcat hacking group, responsible for several breaches over the past months, such as Schneider Electric, TelefΓ³nica, and Orange Romania.

www.kelacyber.com/blog/hellcat...

27.03.2025 13:13 β€” πŸ‘ 8    πŸ” 2    πŸ’¬ 0    πŸ“Œ 0
Preview
23andMe Files for Bankruptcy as CEO Anne Wojcicki Resigns β€” What Will Happen to Your DNA Data? Genetics company 23andMe has filed for bankruptcy and its CEO is stepping down, leaving many users concerned about the future of their data.

We all knew this day would arrive when the DNA samples you willingly provided 23andMe would be up for sale. Company now says it's seeking a buyer as it files for bankruptcy. 23andMe says any buyer will have to adhere to privacy laws for customer DNA/data they acquire. people.com/23andme-file...

24.03.2025 16:58 β€” πŸ‘ 81    πŸ” 36    πŸ’¬ 6    πŸ“Œ 9
Preview
Clevo Boot Guard Keys Leaked in Update Package Over the past few years, the Binarly Research team has led the way in documenting security problems haunting the entire UEFI ecosystem. We presented our discoveries at major security conferences like ...

Clevo Boot Guard Keys Leaked in Update Package

www.binarly.io/blog/clevo-b...

23.03.2025 19:26 β€” πŸ‘ 9    πŸ” 5    πŸ’¬ 0    πŸ“Œ 0
Preview
GitHub - Cryakl/Ultimate-RAT-Collection: For educational purposes only, exhaustive samples of 450+ classic/modern trojan builders including screenshots. For educational purposes only, exhaustive samples of 450+ classic/modern trojan builders including screenshots. - Cryakl/Ultimate-RAT-Collection

Someone has done an excellent job collecting RATs and documenting them by version. They also included images.

A+ work. This is amazing (we're going to ingest this eventually)

github.com/Cryakl/Ultim...

22.03.2025 17:25 β€” πŸ‘ 45    πŸ” 17    πŸ’¬ 0    πŸ“Œ 1
Preview
Tutorial: unpacking executables with TinyTracer + PE-sieve In this short blog I would like to demonstrate you how to unpack an executable with PE-sieve and Tiny Tracer. As an example, let’s use the executable that was packed with a modified UPX: 8f66…

A small demo/tutorial on unpacking executables with #PEsieve and #TinyTracer: hshrzd.wordpress.com/2025/03/22/u...
- automatic OEP finding, reconstructing IAT, avoiding antidebugs and fixing imports broken by shims

22.03.2025 20:53 β€” πŸ‘ 28    πŸ” 13    πŸ’¬ 0    πŸ“Œ 0
table of contents for tmp.0ut volume 4

table of contents for tmp.0ut volume 4

Would you look at that, it's tmp.0ut Volume 4! Happy Friday, hope you enjoy this latest issue!

tmpout.sh/4/

21.03.2025 16:26 β€” πŸ‘ 123    πŸ” 65    πŸ’¬ 2    πŸ“Œ 7

@hasherezade is following 20 prominent accounts