Reverse Engineering – Telegram
Reverse Engineering
4.74K subscribers
106 photos
1 video
18 files
458 links
Everything is open-source.

The official community group: @reverseengineeringz
Download Telegram
Forwarded from MalScanBotChannel
This media is not supported in your browser
VIEW IN TELEGRAM
Here is a quick video demonstrating how @MalScanBot can be used to quickly analyze xls file for malicious indicators from your mobile device.
Pafish is a demonstration tool that employs several techniques to detect sandboxes and analysis environments in the same way as malware families do.

https://github.com/a0rtega/pafish
Auto-renaming dummy-named functions, which have one API call or jump to the imported API

https://github.com/a1ext/auto_re
Indicators of Compromise vs. Tactics, Techniques, and Procedures

https://azeria-labs.com/iocs-vs-ttps/
Corona DDoS bot

In this article, multiple phases will be described using the usual step-by-step approach. Firstly, the main function is analysed in order to get an overview of the malware’s lay-out. Secondly, the local address is obtained. Thirdly, the mutex that is used by the malware is described. Fourthly, the decryption routine for the encrypted strings will be analysed and rewritten in Java. Using this decryptor, the actual values of the encrypted strings can be obtained. Fifthly, the bot’s registration at the command & control server will be analysed, including a connectivity check. Sixthly, the process of dispatching incoming commands will be analysed. Lastly, a conclusion is made based upon the findings

https://maxkersten.nl/binary-analysis-course/malware-analysis/corona-ddos-bot/
Reverse Engineering Gootkit with Ghidra Part I

https://dannyquist.github.io/gootkit-reversing-ghidra/
Malcolm is a powerful, easily deployable network traffic analysis tool suite for full packet capture artifacts (PCAP files) and Zeek logs.

https://github.com/idaholab/Malcolm