Posts tagged on Malware

Analysis of a Redline Based Malware

– In recent months, there have been increasing attempts to spread malware via some seemingly ‘harmless’ programs, luring the user through rewards such as sending money with cryptocurrency or NFT-themed gifts. The unsuspecting user by running an ‘innocent’ executable to access prizes becomes part of a botnet. In this post, I would like to analyse in some detail the … See Full Article

Analysis of a Redline Based Malware Illustration

Analyzing the Mario Themed Malware

– If you were a child with a Nintendo DS like myself, growing up you will undoubtedly have played (for countless hours) video games from the Mario series. Appearing for the first time in “Donkey Kong”, Mario is the undisputed protagonist of the video game brand of the Nintendo development house ― from sports to cars, most of the famous video games produced by Nintendo have Mario as the … See Full Article

Analyzing the Mario Themed Malware Illustration

Take off the Infrastructure of a Scammer: Cryptonder and Torowallet

– On a rainy autumn day, I was contacted like many users by a suspicious individual on Telegram. He insisted on asking for the help of the user who had to recover his wallet which contained several bitcoins. Our “friend”, hencereferred as “M.”, insisted that the user has to register on the platform to be able to unlock his wallet at the price of 0.3 BTC. At this point he … See Full Article

Take off the Infrastructure of a Scammer: Cryptonder and Torowallet Illustration

Botnet analysis based on IRC network

– With one of my many honeypots actived around the world wide web, I discovered an interesting script written with the famous Perl programming language. This Perl script is a malware used to remotely control a machine, opening what is technically called backdoor. If this malicious program runs on multiple machines, there is a possibility that the attacker may have created a botnet. At first, a … See Full Article

Deobfuscation and Understanding a Trojan Jscript

– Over 50% of cyber attacks are executed through malware, whose job is to find a flaw to inject other types of viruses including malware, adware and much more. Knowing the computer remotely, it can spy on the screen and even crypt the files: a wrong click and you lose anything. It is estimated that more than 100 malicious programs are built every week; there are companies that develop protections … See Full Article

Deobfuscation and Understanding a Trojan Jscript Illustration

Developing a Keylogger: Hardware vs. Software Techniques

– To celebrate 400+ visits to my blog after just 10 days (not bad, come on), I managed in my spare time to write another, very interesting article on another popular category of malware: keyloggers. Keyloggers are a particularly insidious form of malware: they are software designed to monitor every key pressed on the keyboard of any device. Unlike other malicious programs, therefore, they do not … See Full Article

Developing a Keylogger: Hardware vs. Software Techniques Illustration

Technical Analysis of WannaCry Ransomware

– By now, on the net, on TV and around the world, there is nothing but talk about WannaCrypt: ransomware, or malware that can encrypt all the files on one’s computer and demand a ransom for unlocking them. It has infected between 500,000 and 600,000 computers in more than half the world. Attacked hospitals, businesses, in short general panic. You probably already know the story, that’s … See Full Article

Technical Analysis of WannaCry Ransomware Illustration

All tags