ReverseEngineering – Telegram
ReverseEngineering
1.24K subscribers
40 photos
10 videos
55 files
666 links
Download Telegram
How to Build

With MinGW (on Windows):

For hotspot_sim.c:

gcc hotspot_sim.c -o hotspot_sim.exe -mwindows


mwindows to remove the console window and build the GUI

For gen_serial.c:

gcc gen_serial.c -o gen_serial.exe


With MSVC (Developer Command Prompt):

hotspot_sim.c:

cl /EHsc hotspot_sim.c user32.lib gdi32.lib

gen_serial.c:

cl /EHsc gen_serial.c

How to test and use

Inside a Windows VM, be sure to run the VM and snapshot for the hotspot_sim.exe file

Give it a name of your choice, for example Ali. Now either create the serial with gen_serial.exe Ali and paste it in the Serial field, or run the generation function inside the debugger and read the expected value

If the serial is correct, the MessageBox will display success

A short guide to analyzing in x64dbg / IDA

Search Strings
: "Name:", "Serial:", "%04X-%04X-%04X", "Activate & Play" → References usually indicate important functions

IsDebuggerPresent: breakpoint
On IsDebuggerPresent or the address that calls it, if it returns 1, the program will hit the error path

GetWindowTextA: breakpoint
Put it to see the value of name and serial in memory

Constants: Search for XOR constants (0xA5A5A5A5, 0x5A5A5A5A, 0x3C3C3C3C) or the pattern %04X-%04X-%04X will take you to the serial generation function

Comparison: breakpoint on stricmp to see the two buffers before comparing

MessageBoxA:
Putting a breakpoint here will quickly tell you which branch was executed successfully or failed

@reverseengine
1
تحلیل استفاده از ابزارهای RMM برا بایپس EDR در حملات گروه های باج افزاری Medusa و DragonForce

Analysis of the use of RMM tools to bypass EDR in Medusa and DragonForce ransomware attacks


https://zensec.co.uk/blog/how-rmm-abuse-fuelled-medusa-dragonforce-attacks

@FUZZ0x
1
lookout-pegasus-technical-analysis.pdf
1.8 MB
Technical Analysis of Pegasus Spyware

@reverseengine
1