top of page
​
Search
z3r0day_504
Mar 14, 20221 min read
What is fuzzy hashing?
In a recent conversation with a coworker, the topic of fuzzy hashing came up and how frequently he uses it in his malware analysis...
3,427 views0 comments
z3r0day_504
Feb 7, 20223 min read
Basic PDF Analysis - Formbook Malware
Analysis of Formbook malware delivered via PDF file
283 views0 comments
z3r0day_504
Jan 9, 20224 min read
Malware Headliners: Dridex
Dridex is a banking trojan that has plagued the cyberverse for years. Check out this post for some initial malware analysis.
278 views0 comments
z3r0day_504
Jan 2, 20226 min read
"Cracking Open the Malware Piñata" Series: Intro to Dynamic Analysis with RedLineStealer
Dynamic analysis involves running a binary and observing its behavior in a controlled environment. This can be of significant benefit...
230 views0 comments
z3r0day_504
Dec 27, 20217 min read
"Cracking Open the Malware Piñata" Series: Intro to Static Analysis with Kazy Trojan
Static analysis, put concisely, is getting information from a specimen without actually executing/detonating it. While it is less...
50 views0 comments
z3r0day_504
Dec 20, 20215 min read
"Cracking Open the Malware Piñata" Series: Analysis Environment Setup
In recent weeks I've spent a good amount of time delving into a topic that truly fascinates me, and that's malware reverse engineering....
36 views0 comments
Home: Subscribe
CONTACT
bottom of page