Introduction Recently, I downloaded a malware sample from Malware Bazaar for analysis. As I began reverse engineering it using Binary Ninja, I discovered something particularly
Category: Reverse Engineering
The Hacker’s “Goldilocks”: Why Malware Like Conti Loves the MurmurHash Algorithm
In the digital shadows where hackers and security pros play a constant game of cat and mouse, every little advantage counts. For malware creators, this
Registry Shenanigans: How Malware Hides in Plain Sight
Ever wonder how sneaky malware tries to avoid getting caught? One clever trick they use involves the Windows Registry, that super important database where your
Shellcode & The Art of In-Memory Code Injection: A Deep Dive for Security Enthusiasts
Ever wondered how attackers manage to sneak their malicious code into running programs without triggering alarms? The answer often lies in a sophisticated technique called
Supercharging Malware Analysis in Binary Ninja: Automated String IOC Lookup with VirusTotal
Malware analysis is often a race against time. Analysts meticulously dissect malicious code, searching for clues, indicators of compromise (IOCs), and a deeper understanding of
Using AI to Rename Variables Like a Pro
Hey, Let’s Make Code Easier to Read! Ever looked at decompiled code and groaned at names like var_18 or var_1c? They’re about as helpful as a map with