Introduction Recently, I downloaded a malware sample from Malware Bazaar for analysis. As I began reverse engineering it using Binary Ninja, I discovered something particularly
Category: Malware
The Hacker’s “Goldilocks”: Why Malware Like Conti Loves the MurmurHash Algorithm
In the digital shadows where hackers and security pros play a constant game of cat and mouse, every little advantage counts. For malware creators, this
Shellcode & The Art of In-Memory Code Injection: A Deep Dive for Security Enthusiasts
Ever wondered how attackers manage to sneak their malicious code into running programs without triggering alarms? The answer often lies in a sophisticated technique called
Leveraging AI Assistance in Malware Analysis: A Modern Approach
Malware analysis is a critical yet intricate task in cybersecurity, often requiring analysts to reverse-engineer complex binaries to uncover malicious behavior. With the rise of
Indirect vs Direct Syscall
Hi Fellows, I have been reading some insightful posts on the internet concerning red teaming exercises. I am particularly interested in topics that delve into
Injecting Payload with Doppelganging
I researched an article and including training materials available on the internet to explore some creative techniques developed by researchers for injecting a malicious payload