Latest malware analysisMalware Analysis / Reverse Engineering Course

Begin Learning Cyber Security for FREE Now!

FREE REGISTRATION
Already a Member Login Here

Home Forums Courses Malware Analysis / Reverse Engineering Course Latest malware analysis

This topic contains 7 replies, has 5 voices, and was last updated by  Franck KAMGAING 4 years, 1 month ago.

Viewing 8 posts - 1 through 8 (of 8 total)
  • Author
    Posts
  • #28794

    JGa
    Participant

    Share us latest malware analysis, news and source codes

    #28803

    JGa
    Participant

    It is a program installed on a system without the knowledge of owner of the system. It is basically installed by the third party with the intention to steal some private data from the system or simply just to play pranks.

    Classification of Malware.
    -Virus
    -Worm
    -Trojan
    -Rootkit
    -Spyware
    -Keylogger …

    #28805

    JGa
    Participant

    Malware detection techniques
    – Static analysis
    – Dynamic analysis
    – Hybrid analysis

    Various static analysis techniques are as follows
    Signature based detection
    File based
    Weight based
    Rule based
    and Generic signature

    #30190

    Mathanraj TK
    Participant

    NEW TRICKS OF MACRO MALWARE
    spam emails that have an attachment of “.DOC” extension file name but actually is a “.MHT” file. This trending trick seems to be a new way to spread macro malware.
    “.MHT” file looks like when opened in a text viewer.
    The encoded base64 ActiveMime data below is where the OLE file that has malicious macro script resides.
    if You Decoding the base64 data then you will have the ActiveMime data file.
    ActiveMime data that is ZLIB compressed. Decompressing ActiveMime data will lead us to the OLE file that has the malicious macro script.

    #30258

    OPsecJ
    Participant

    https://www.google.com/webhp?sourceid=chrome-instant&ion=1&espv=2&ie=UTF-8#q=angler%20kit%20malware

    ^Check out the angler malware kit … its dropping all over the place. We are detecting it being dropped on hacked wordpress sites that weren’t updated to the current version. Pretty wild stuff as it both custom creates and encrypts its package

    #32628

    MiracLUL
    Participant

    Excuse me..what is the best way to remove trojan when i got it on my pc??
    Thanks

    #32665

    OPsecJ
    Participant

    ^ could be as simple as clicking a bad link in an email. If the web server was running/sending an exploit without a patch (or you didn’t have the latest patches on your machine), you get owned in 2 seconds. If the attackers payload/task_list is scripted, once the connection gets established, the given process executes, and the attacker comes in and gets out. Wait, what was the question?

    Could be a virus that spread from an infected usb stick. Could be downloaded/installed malware – Could be that you have a downloader malware variant on your machine, so you are constantly getting new malware to host/use.

    …etc etc

    Install Emsisoft Emergency Kit and Scan/Remove anything it finds (its free):
    https://www.emsisoft.com/en/software/eek/

    Install Malwarebytes and Scan/Delete anything it finds (the free one):
    https://www.malwarebytes.org/mwb-download/

    • This reply was modified 4 years, 1 month ago by  OPsecJ.
    #34629

    Franck KAMGAING
    Participant

    yep

Viewing 8 posts - 1 through 8 (of 8 total)

You must be logged in to reply to this topic.

Our Revolution

We believe Cyber Security training should be free, for everyone, FOREVER. Everyone, everywhere, deserves the OPPORTUNITY to learn, begin and grow a career in this fascinating field. Therefore, Cybrary is a free community where people, companies and training come together to give everyone the ability to collaborate in an open source way that is revolutionizing the cyber security educational experience.

Support Cybrary

Donate Here to Get This Month's Donor Badge

 

Cybrary|0P3N

Is Linux Worth Learning in 2020?
Views: 334 / December 14, 2019
How do I Get MTA Certified?
Views: 926 / December 12, 2019
How much does your PAM software really cost?
Views: 1379 / December 10, 2019
How Do I Get into Android Development?
Views: 1757 / December 8, 2019

We recommend always using caution when following any link

Are you sure you want to continue?

Continue
Cancel