Blog Archive
Dridex - Technical Malware Analysis
One of the most famous banking Trojans back in 2014.
Read Post
Qbot Technical Analysis
In this article, we take a look at how Qbot dynamically decrypts strings, creates API structs, and decrypts payloads. Then, we discuss about dealing with them using Binary Ninja and Binary Refinery.
Read Post
Z2A Custom Sample Part 2
Here we come to the next part of my write-up for Z2A custom sample. I will analyze the stage 2 of this sample, and also extract the final stage.
Read Post
Z2A Custom Sample Part 1
After many theoretical chapters, we finally move to a practical session with a custom sample. This is part one of my analysis.
Read Post
Deobfuscate with Binary Ninja API
Recently, I’ve become very interested in learning how to use the Binary Ninja API to build a deobfuscator. So, I read all their posts and started with a simple challenge from the Grand Reverse Engineering Challenge.
Read Post
Quick notes about PE file format
This is just a note for some Windows Structures that I found useful to look back on while analyzing
Read Post
Malware Unpacking Notes
Unpacking is well-known as a method for malware to hide its actual payload. Understanding this concept is fundamental for malware analysis.
Read Post