z3r0day_504Mar 14, 20221 minWhat is fuzzy hashing?In a recent conversation with a coworker, the topic of fuzzy hashing came up and how frequently he uses it in his malware analysis...
z3r0day_504Feb 7, 20223 minBasic PDF Analysis - Formbook MalwareAnalysis of Formbook malware delivered via PDF file
z3r0day_504Jan 9, 20224 minMalware Headliners: DridexDridex is a banking trojan that has plagued the cyberverse for years. Check out this post for some initial malware analysis.
z3r0day_504Jan 2, 20226 min"Cracking Open the Malware Piñata" Series: Intro to Dynamic Analysis with RedLineStealerDynamic analysis involves running a binary and observing its behavior in a controlled environment. This can be of significant benefit...
z3r0day_504Dec 27, 20217 min"Cracking Open the Malware Piñata" Series: Intro to Static Analysis with Kazy TrojanStatic analysis, put concisely, is getting information from a specimen without actually executing/detonating it. While it is less...
z3r0day_504Dec 20, 20215 min"Cracking Open the Malware Piñata" Series: Analysis Environment SetupIn recent weeks I've spent a good amount of time delving into a topic that truly fascinates me, and that's malware reverse engineering....