π¦ πΉ Video: Analysis of malicious NordVPN setup
β‘οΈ beginner-suitable
β‘οΈ sorry, no spoilers here ;)
www.youtube.com/watch?v=5-OY...
#MalwareAnalysisForHedgehogs
@struppigel.bsky.social
π¦ πΉ Video: Analysis of malicious NordVPN setup
β‘οΈ beginner-suitable
β‘οΈ sorry, no spoilers here ;)
www.youtube.com/watch?v=5-OY...
#MalwareAnalysisForHedgehogs
I am looking for good resources for Linux malware analysis, including books and courses.
If you have any recommendations please let me know.
Thank you @threatresearch.bsky.social
06.10.2025 13:04 β π 0 π 0 π¬ 0 π 0My #VirusBulletin2025 loot π
I also met someone from vxunderground and all I got was this lousy sticker
Steam game BlockBlasters downloads malware
written by Arvin Tan
#GDATATechblog @GDATA #GDATA
www.gdatasoftware.com/blog/2025/09...
My colleague Banu wrote about the connection between AppSuite, OneStart and ManualFinder
www.gdatasoftware.com/blog/2025/09...
Invite link for our Discord expired, because I did not change the default limit.
Here is a new one, this time without limit
discord.gg/8xB38EedHT
π¦ πΉ New video: What breakpoints to set for unpacking malware?
β‘οΈ Steps of unpacking stub
β‘οΈ Breakpoint targets
β‘οΈ VirtualAlloc from user to kernel mode
#MalwareAnalysisForHedgehogs #Unpacking
www.youtube.com/watch?v=fn8r...
Thanks!
02.09.2025 06:55 β π 0 π 0 π¬ 0 π 0In light of the new course, I created a Discord server for MalwareAnalysisForHedghogs to discuss malware analysis related topics.
You can join here--this is for every malware enthusiast, not only course members: discord.gg/3evhC4cj
My intermediate level malware analysis course is there.
60% off for the next two weeks.
malwareanalysis-for-hedgehogs.learnworlds.com/course/inter...
This blog post about impostor certificates by @SquiblydooBlog is a gem and very relevant right now.
Or: How threat actors impersonate companies to obtain authenticode certificates for signing their malware.
And why revokation is important.
squiblydoo.blog/2024/05/13/i...
Our technical deep-dive about AppSuite PDF Editor backdoor is out ππ
www.gdatasoftware.com/blog/2025/08...
#GDATA #GDATATechblog #AppSuite
IDA, why are you doing this?
I lost my work because IDA refused to save. I needed to reboot the system to get network connection again. Without network there is no licensing server available.
Surely there must be a better way to not loose work?
These PDF editors are functional but each contain a backdoor
β‘οΈhttps://virustotal.com/gui/file/fde67ba523b2c1e517d679ad4eaf87925c6bbf2f171b9212462dc9a855faa34b
bazaar.abuse.ch/sample/17355...
URLs
pdfreplace(dot)com
pdfmeta(dot)com
pdfartisan(dot)com
appsuites(dot)ai
#TamperedChef
driver reversing 101
eversinc33.com/posts/driver...
Comprehensive analysis of #HijackLoader
by Ryan Weil
www.trellix.com/blogs/resear...
Thank you
14.08.2025 04:12 β π 0 π 0 π¬ 0 π 0πNew Blog: JustAskJacky -- AI brings back classical trojan horse malware
www.gdatasoftware.com/blog/2025/08...
#GDATA #GDATATechblog
π¦ πΉ New Video: There is more than Clean and Malicious
β‘οΈ 7 file analysis verdicts and what they mean
#MalwareAnalysisForHedgehogs #Verdicts
www.youtube.com/watch?v=XwT2...
The course will not be hosted on Udemy. I am very unhappy with it.
The Beginners' course will also be moved to the new platform.
Good news, the intermediate malware analysis course is almost finished.
I have currently a test student working through the course to get rid of mistakes that I do not notice.
Nikola KneΕΎeviΔ created an overview of AsyncRAT forks and how they relate to each other. Great research.
#AsyncRAT #QuasarRAT
www.welivesecurity.com/en/eset-rese...
A side by side comparison of the original output by Ghidra, and the LLM enriched output.
Ghidra, scripting, LLM, automagic automation. That should grab the attention for this thread. If you want to read the complete blog, you can do so here: www.trellix.com/blogs/resear...
1/n
π¦ πΉ Virut Part III: File infection analysis and bait file creation
#MalwareAnalysisForHedgehogs #Virut
www.youtube.com/watch?v=FcXP...
Blog: "Supper is served"
Excellent analysis article of the backdoor Supper by @c-b.io
c-b.io/2025-06-29+-...
Regarding the last point:
A conclusion makes sense if you have something to add that wasn't there before.
But if you just repeat what you wrote before, it is very boring. In those instances it is better to not add it at all. A blog is not a thesis.
Tips for newcomers to malware blog articles:
β‘οΈYou don't need to document every malware function. Focus on key areas
β‘οΈYour text must be factually correct and it is okay to skip those details you are unsure about
β‘οΈWhen you are done, just stop writing
A colleague and me wrote an article about EvilConwi -- signed ConnectWise remote access software being abused as malware
#GDATATechblog
www.gdatasoftware.com/blog/2025/06...
Virut part II: process infection and NTDLL hooking π¦πΉ
β‘οΈx64dbg scripting
β‘οΈconditional breakpoints
β‘οΈmore import table resolving
β‘οΈfixing control flow
β‘οΈmarking up hook code
#MalwareAnalysisForHedgehogs #Virut
www.youtube.com/watch?v=nuxn...