• Home
  • Back to Basics
  • Malware Analysis
    • PMA Labs
  • RE 101
  • Threat Lab
  • Resources
  • About Me

Site logo

Satyajit Daulaguphu
https://tech-zealots.com

Malware Analysis

Understanding PE Structure, The Layman’s Way – Malware Analysis Part 2

By Satyajit Daulaguphu on Thursday, May 10, 2018
PE header format

Hello readers! In this article, we will look at the PE Header which is very much important in understanding the internal part of an executable file. Once you have an overall idea about what’s inside the executable file and how that executable file works in Windows it will then become easy for you to analyze …

Continue Reading
0
Threat Lab

Office 365’s ATP Security Feature Creating Havoc

By Satyajit Daulaguphu on Friday, April 20, 2018
Microsoft Safelinks

Hello readers! Today I will be writing a general post which I think can be helpful for the SOC analysts while creating incidents. So, let’s first understand what this article is about and how it will help you in your process. So, ATP safe links is actually a security feature of Microsoft that comes with …

Continue Reading
0
Malware Analysis

Malware Persistence Techniques – Hacker’s Pandora Box

By Satyajit Daulaguphu on Saturday, April 7, 2018
Malware Persistence Techniques

Hi readers! The agenda of this article is to give a brief overview of the registry keys and the ways malware authors use in order to achieve persistence so as to evade detection by traditional security technology. Malware often uses the registry for persistence or configuration data. And as soon as the malware gets inside …

Continue Reading
0
Malware Analysis

JavaScript Code Obfuscation Techniques For Malware Delivery

By Satyajit Daulaguphu on Sunday, April 1, 2018
JavaScript Code Obfuscation

JavaScript code obfuscation techniques play a key role in delivering a malicious payload when an attackers want to target their users and they achieve this by hiding their code so that it could evade the detection of anti-virus software. JavaScript-based attacks have been reported as the top Internet security threats in recent years and have become …

Continue Reading
0
Threat Lab

Malicious Word Document Spreading Sigma Ransomware

By Satyajit Daulaguphu on Thursday, March 29, 2018
Sigma Ransomware

Today I had a chance to investigate another SPAM email which we received in our queue and at least 5 such emails were reported to us. But was not sure how many such emails were received by the users in our organization. The email contains a password protected doc and the password was provided in …

Continue Reading
0

Posts navigation

← Previous 1 2 3 4 Next →
About The Author
Satyajit Daulaguphu
Satyajit Daulaguphu

Security blogger and currently a Research Scientist at FireEye. He feels security is his daily cup of coffee.

Follow Me
Donate on Ko-fi
Categories
  • Back to Basics
  • Malware Analysis
  • Reverse Engineering
  • Threat Lab
Subscribe Us
Get our latest articles on Malware Analysis & threat research delivered to your inbox!

Recent Posts
  • So, Emotet’s Back Huh…
  • How To Quickly Extract Malicious Macros From Document & Triage Incident
  • Dissecting WannaCry Ransomware To It’s Core – Technical Analysis
  • Understanding Concepts Of VA, RVA and Offset
  • A Journey Towards an Import Address Table (IAT) of an Executable File
  • DeObfuscating #Emotet’s Malicious VBA Macro Like a Pro!!
  • Dissecting Manual Unpacking of a UPX Packed File
Recent Comments
  • Jeha on Understanding Concepts Of VA, RVA and Offset
  • Thanursan on Understanding Concepts Of VA, RVA and Offset
  • Satya on Understanding Concepts Of VA, RVA and Offset
  • Thanursan on Understanding Concepts Of VA, RVA and Offset
  • Abid khan on How To Install and Get Cuckoo Sandbox Working Perfectly – Part 1
Advertisement
Support Brave

Resources
  • About Me
  • Cookies Policy
  • Privacy Policy
  • Resources
  • Reverse Engineering Basics
Recent Posts
  • So, Emotet’s Back Huh…
  • How To Quickly Extract Malicious Macros From Document & Triage Incident
  • Dissecting WannaCry Ransomware To It’s Core – Technical Analysis
  • Understanding Concepts Of VA, RVA and Offset
Newsletter
Get our latest articles on Malware Analysis & threat research delivered to your inbox!

© 2020 Tech Zealots. All rights reserved.