top of page

Search


What is fuzzy hashing?
In a recent conversation with a coworker, the topic of fuzzy hashing came up and how frequently he uses it in his malware analysis...
z3r0day_504
Mar 14, 20221 min read
3,431 views
0 comments


Basic PDF Analysis - Formbook Malware
Analysis of Formbook malware delivered via PDF file
z3r0day_504
Feb 7, 20223 min read
283 views
0 comments


Malware Headliners: Dridex
Dridex is a banking trojan that has plagued the cyberverse for years. Check out this post for some initial malware analysis.
z3r0day_504
Jan 9, 20224 min read
278 views
0 comments


"Cracking Open the Malware Piñata" Series: Intro to Dynamic Analysis with RedLineStealer
Dynamic analysis involves running a binary and observing its behavior in a controlled environment. This can be of significant benefit...
z3r0day_504
Jan 2, 20226 min read
230 views
0 comments


"Cracking Open the Malware Piñata" Series: Intro to Static Analysis with Kazy Trojan
Static analysis, put concisely, is getting information from a specimen without actually executing/detonating it. While it is less...
z3r0day_504
Dec 27, 20217 min read
50 views
0 comments


"Cracking Open the Malware Piñata" Series: Analysis Environment Setup
In recent weeks I've spent a good amount of time delving into a topic that truly fascinates me, and that's malware reverse engineering....
z3r0day_504
Dec 20, 20215 min read
36 views
0 comments
Home: Subscribe

bottom of page