The Byte Atlas
18.08.2015

Knowledge Fragment: Fobber Inline String Decryption

›
In the other blog post on Fobber, I have demonstrated how to batch decrypt function code, which left us with IDA recognizing a fair amount ...
1 Kommentar:

Knowledge Fragment: Unwrapping Fobber

›
About two weeks ago I came across an interesting sample using an interesting anti-analysis pattern. The anti-analysis technique can be best...
1 Kommentar:
15.04.2015

Knowledge Fragment: Bruteforcing Andromeda Configuration Buffers

›
This blog post details how the more recent versions of Andromeda store their C&C URLs and RC4 key and how this information can be brutef...
25.09.2014

DingleElite DDoS Bot (WOPBOT)

›
re: http://www.kernelmode.info/forum/viewtopic.php?f=16&t=3505   sha256: 73b0d95541c84965fa42c3e257bb349957b3be626dec9d55efcc6...
24.09.2014

Intro

›
From now on I'll use this blog as a platform to publish loose bits of information on different when playing with malware that crosses my...
‹
Startseite
Web-Version anzeigen

Über mich

Mein Bild
ByteAtlas
Mein Profil vollständig anzeigen
Powered by Blogger.