π¦ πΉ New Video: There is more than Clean and Malicious
β‘οΈ 7 file analysis verdicts and what they mean
#MalwareAnalysisForHedgehogs #Verdicts
www.youtube.com/watch?v=XwT2...
@struppigel.bsky.social
π¦ πΉ New Video: There is more than Clean and Malicious
β‘οΈ 7 file analysis verdicts and what they mean
#MalwareAnalysisForHedgehogs #Verdicts
www.youtube.com/watch?v=XwT2...
The course will not be hosted on Udemy. I am very unhappy with it.
The Beginners' course will also be moved to the new platform.
Good news, the intermediate malware analysis course is almost finished.
I have currently a test student working through the course to get rid of mistakes that I do not notice.
Nikola KneΕΎeviΔ created an overview of AsyncRAT forks and how they relate to each other. Great research.
#AsyncRAT #QuasarRAT
www.welivesecurity.com/en/eset-rese...
A side by side comparison of the original output by Ghidra, and the LLM enriched output.
Ghidra, scripting, LLM, automagic automation. That should grab the attention for this thread. If you want to read the complete blog, you can do so here: www.trellix.com/blogs/resear...
1/n
π¦ πΉ Virut Part III: File infection analysis and bait file creation
#MalwareAnalysisForHedgehogs #Virut
www.youtube.com/watch?v=FcXP...
Blog: "Supper is served"
Excellent analysis article of the backdoor Supper by @c-b.io
c-b.io/2025-06-29+-...
Regarding the last point:
A conclusion makes sense if you have something to add that wasn't there before.
But if you just repeat what you wrote before, it is very boring. In those instances it is better to not add it at all. A blog is not a thesis.
Tips for newcomers to malware blog articles:
β‘οΈYou don't need to document every malware function. Focus on key areas
β‘οΈYour text must be factually correct and it is okay to skip those details you are unsure about
β‘οΈWhen you are done, just stop writing
A colleague and me wrote an article about EvilConwi -- signed ConnectWise remote access software being abused as malware
#GDATATechblog
www.gdatasoftware.com/blog/2025/06...
Virut part II: process infection and NTDLL hooking π¦πΉ
β‘οΈx64dbg scripting
β‘οΈconditional breakpoints
β‘οΈmore import table resolving
β‘οΈfixing control flow
β‘οΈmarking up hook code
#MalwareAnalysisForHedgehogs #Virut
www.youtube.com/watch?v=nuxn...
Blog: Printer company provided infected printer software for half a year.
β‘οΈ XRed backdoor
β‘οΈ SnipVex virus
Initially reported by Youtuber of "Serial Hobbyism"
www.gdatasoftware.com/blog/2025/05...
π¦ πΉNew Video: Analysis of Virut - Part I
β‘οΈ self-modifying code
β‘οΈ Ghidra markup decryption stub
β‘οΈ API resolving
β‘οΈ unpacking
#MalwareAnalysisForHedgehogs
www.youtube.com/watch?v=250B...
I wrote how to use knowledge about .NET structures and streams for writing .NET Yara signatures.
E.g. IL code patterns, method signature definitions, GUIDs, compressed length
#GDATATechblog #100DaysOfYara
www.gdatasoftware.com/blog/2025/04...
Podcast with @jstrosch.bsky.social and @psifertex.bsky.social about:
binary ninja, CTFs, AI, the future of cyber security
open.spotify.com/episode/6tMY...
This might also be interesting for you if you want to know how to deobfuscate .NET Reactor 6 or how to debug .NET DLL files.
02.03.2025 11:56 β π 1 π 0 π¬ 0 π 0Maybe it was created with AI help but the creator did not understand that it does not work. Dunno, my guess is as good as yours.
02.03.2025 10:19 β π 3 π 0 π¬ 1 π 0π¦ πΉ New Video: Unpacking Lumma Stealer
We continue where we left off last time and unpack the Emmenhtal to Pure Crypter to Lumma Stealer chain.
www.youtube.com/watch?v=aenO...
#MalwareAnalysisForHedgehogs #LummaStealer
This curious wanna-be Batch virus appeared already on several systems. But why?
autoexec.NT does not work anymore and it has an endless loop that pretends to scan.
Did not find any tmp.bat yet. Not sure it even exists.
www.virustotal.com/gui/file/e28...
π¦ πΉ New Video: Binary Refinery deobfuscation of a LummaStealer loader (PowerShell, JScript)
www.youtube.com/watch?v=kHU_...
#MalwareAnalysisForHedgehogs #PowerShell #JScript
We would have less fake news about malware on USB adapters and analysis time wasted if sandboxes changed their wording from "malicious" to "interesting to look at"--which is how they are actually understood by analysts.
www.gdatasoftware.com/blog/2024/09...
Thanks!
11.01.2025 08:58 β π 1 π 0 π¬ 1 π 0What is the name of the book?
11.01.2025 04:14 β π 1 π 0 π¬ 1 π 0Thank you :)
03.01.2025 05:42 β π 2 π 0 π¬ 0 π 0πNew Video: Antivirus myths
π www.youtube.com/watch?v=4Dol...
Or why these sentences are wrong:
β‘οΈ AVs use mostly pattern signatures
β‘οΈ AI is a new defense technique
β‘οΈ defense techniques must focus on high detection rate
β‘οΈ behavior signatures are heuristic and patterns are not
Thank you. This was not written by me but my colleague Marius Benthin :)
03.01.2025 05:40 β π 1 π 0 π¬ 1 π 0Start at minute 36:07 to get the summary of tips.
Sample is available here: www.unpac.me/results/3c11...
PrivateLoader Yara rule: gist.github.com/struppigel/c...
π¦ πΉ Video: Learn how to write code based signatures
β‘οΈ using privateloader as example
β‘οΈ what to detect
β‘οΈ where to set wildcards
β‘οΈ how to test your rule on unpac me
www.youtube.com/watch?v=oxC9...
#MalwareAnalysisForHedgehogs #privateloader
Awesome stream with rattle/Jesko and Dr Josh Stroschein
showcasing binary refinery
Binref is hard to learn but very rewarding.
www.youtube.com/live/-B072w0...
Hey thanks!
19.11.2024 14:46 β π 1 π 0 π¬ 0 π 0