Malware AV/VM evasion - part 13: encrypt/decrypt payload via Madryga. Simple C++ example. 6 minute read ﷽
Malware AV/VM evasion - part 12: encrypt/decrypt payload via TEA. Simple C++ example. 10 minute read ﷽
Malware analysis: part 8. Yara rule example for MurmurHash2. MurmurHash2 in Conti ransomware 5 minute read ﷽
Malware development: persistence - part 21. Recycle Bin, My Documents COM extension handler. Simple C++ example. 3 minute read ﷽
Malware development: persistence - part 20. UserInitMprLogonScript (Logon Script). Simple C++ example. 2 minute read ﷽
Malware development: persistence - part 19. Disk Cleanup Utility. Simple C++ example. 2 minute read ﷽
Malware development: persistence - part 18. Windows Error Reporting. Simple C++ example. 3 minute read ﷽
Malware development: persistence - part 16. Cryptography Registry Keys. Simple C++ example. 2 minute read ﷽
Malware development: persistence - part 14. Event Viewer help link. Simple C++ example. 2 minute read ﷽
Malware development: persistence - part 13. Hijacking uninstall logic for application. Simple C++ example. 2 minute read ﷽
Malware development: persistence - part 12. Accessibility Features. Simple C++ example. 2 minute read ﷽
Malware development: persistence - part 10. Using Image File Execution Options. Simple C++ example. 4 minute read ﷽
Malware development: persistence - part 9. Default file extension hijacking. Simple C++ example. 2 minute read ﷽
Malware development: persistence - part 6. Windows netsh helper DLL. Simple C++ example. 2 minute read ﷽
Malware AV/VM evasion - part 13: encrypt/decrypt payload via Madryga. Simple C++ example. 6 minute read ﷽
Malware AV/VM evasion - part 12: encrypt/decrypt payload via TEA. Simple C++ example. 10 minute read ﷽
Malware development: persistence - part 21. Recycle Bin, My Documents COM extension handler. Simple C++ example. 3 minute read ﷽
Malware development: persistence - part 20. UserInitMprLogonScript (Logon Script). Simple C++ example. 2 minute read ﷽
Malware development: persistence - part 19. Disk Cleanup Utility. Simple C++ example. 2 minute read ﷽
Malware development: persistence - part 18. Windows Error Reporting. Simple C++ example. 3 minute read ﷽
Malware development: persistence - part 16. Cryptography Registry Keys. Simple C++ example. 2 minute read ﷽
Malware development: persistence - part 14. Event Viewer help link. Simple C++ example. 2 minute read ﷽
Malware development: persistence - part 13. Hijacking uninstall logic for application. Simple C++ example. 2 minute read ﷽
Malware development: persistence - part 12. Accessibility Features. Simple C++ example. 2 minute read ﷽
Malware development: persistence - part 10. Using Image File Execution Options. Simple C++ example. 4 minute read ﷽
Malware development: persistence - part 9. Default file extension hijacking. Simple C++ example. 2 minute read ﷽
Malware development: persistence - part 6. Windows netsh helper DLL. Simple C++ example. 2 minute read ﷽
Malware AV/VM evasion - part 13: encrypt/decrypt payload via Madryga. Simple C++ example. 6 minute read ﷽
Malware AV/VM evasion - part 12: encrypt/decrypt payload via TEA. Simple C++ example. 10 minute read ﷽
Malware analysis: part 8. Yara rule example for MurmurHash2. MurmurHash2 in Conti ransomware 5 minute read ﷽
Malware development: persistence - part 21. Recycle Bin, My Documents COM extension handler. Simple C++ example. 3 minute read ﷽
Malware development: persistence - part 20. UserInitMprLogonScript (Logon Script). Simple C++ example. 2 minute read ﷽
Malware development: persistence - part 19. Disk Cleanup Utility. Simple C++ example. 2 minute read ﷽
Malware development: persistence - part 18. Windows Error Reporting. Simple C++ example. 3 minute read ﷽
Malware development: persistence - part 16. Cryptography Registry Keys. Simple C++ example. 2 minute read ﷽
Malware development: persistence - part 14. Event Viewer help link. Simple C++ example. 2 minute read ﷽
Malware development: persistence - part 13. Hijacking uninstall logic for application. Simple C++ example. 2 minute read ﷽
Malware development: persistence - part 12. Accessibility Features. Simple C++ example. 2 minute read ﷽
Malware development: persistence - part 10. Using Image File Execution Options. Simple C++ example. 4 minute read ﷽
Malware development: persistence - part 9. Default file extension hijacking. Simple C++ example. 2 minute read ﷽
Malware development: persistence - part 6. Windows netsh helper DLL. Simple C++ example. 2 minute read ﷽
Malware AV/VM evasion - part 13: encrypt/decrypt payload via Madryga. Simple C++ example. 6 minute read ﷽
Malware AV/VM evasion - part 12: encrypt/decrypt payload via TEA. Simple C++ example. 10 minute read ﷽
Malware analysis: part 8. Yara rule example for MurmurHash2. MurmurHash2 in Conti ransomware 5 minute read ﷽
Malware development: persistence - part 21. Recycle Bin, My Documents COM extension handler. Simple C++ example. 3 minute read ﷽
Malware development: persistence - part 20. UserInitMprLogonScript (Logon Script). Simple C++ example. 2 minute read ﷽
Malware development: persistence - part 19. Disk Cleanup Utility. Simple C++ example. 2 minute read ﷽
Malware development: persistence - part 18. Windows Error Reporting. Simple C++ example. 3 minute read ﷽
Malware development: persistence - part 16. Cryptography Registry Keys. Simple C++ example. 2 minute read ﷽
Malware development: persistence - part 14. Event Viewer help link. Simple C++ example. 2 minute read ﷽
Malware development: persistence - part 13. Hijacking uninstall logic for application. Simple C++ example. 2 minute read ﷽
Malware development: persistence - part 12. Accessibility Features. Simple C++ example. 2 minute read ﷽
Malware development: persistence - part 10. Using Image File Execution Options. Simple C++ example. 4 minute read ﷽
Malware development: persistence - part 9. Default file extension hijacking. Simple C++ example. 2 minute read ﷽
Malware development: persistence - part 6. Windows netsh helper DLL. Simple C++ example. 2 minute read ﷽
Malware development: persistence - part 21. Recycle Bin, My Documents COM extension handler. Simple C++ example. 3 minute read ﷽
Malware development: persistence - part 20. UserInitMprLogonScript (Logon Script). Simple C++ example. 2 minute read ﷽
Malware development: persistence - part 19. Disk Cleanup Utility. Simple C++ example. 2 minute read ﷽
Malware development: persistence - part 18. Windows Error Reporting. Simple C++ example. 3 minute read ﷽
Malware development: persistence - part 16. Cryptography Registry Keys. Simple C++ example. 2 minute read ﷽
Malware development: persistence - part 14. Event Viewer help link. Simple C++ example. 2 minute read ﷽
Malware development: persistence - part 13. Hijacking uninstall logic for application. Simple C++ example. 2 minute read ﷽
Malware development: persistence - part 12. Accessibility Features. Simple C++ example. 2 minute read ﷽
Malware development: persistence - part 10. Using Image File Execution Options. Simple C++ example. 4 minute read ﷽
Malware development: persistence - part 9. Default file extension hijacking. Simple C++ example. 2 minute read ﷽
Malware development: persistence - part 6. Windows netsh helper DLL. Simple C++ example. 2 minute read ﷽
Malware AV/VM evasion - part 13: encrypt/decrypt payload via Madryga. Simple C++ example. 6 minute read ﷽
Malware AV/VM evasion - part 12: encrypt/decrypt payload via TEA. Simple C++ example. 10 minute read ﷽
Malware analysis: part 8. Yara rule example for MurmurHash2. MurmurHash2 in Conti ransomware 5 minute read ﷽
Malware analysis: part 8. Yara rule example for MurmurHash2. MurmurHash2 in Conti ransomware 5 minute read ﷽