Tech Zealots
  • MALWARE ANALYSIS
    • A Beginner’s Guide To PE File Format
    • What’s Import Address Table (IAT) In an Executable
  • SANDBOX
    • How to Install Cuckoo Sandbox? [Part 1]
    • How To Configure Guest Machine For Cuckoo? [Part 2]
  • THREAT LAB
  • RESOURCES
  • ABOUT
Tech Zealots
Follow
Tech Zealots
  • MALWARE ANALYSIS
    • A Beginner’s Guide To PE File Format
    • What’s Import Address Table (IAT) In an Executable
  • SANDBOX
    • How to Install Cuckoo Sandbox? [Part 1]
    • How To Configure Guest Machine For Cuckoo? [Part 2]
  • THREAT LAB
  • RESOURCES
  • ABOUT

Browsing Category

Malware Analysis

7 posts

Maybe you’ve just started, or maybe you’ve taken a couple of entry-level malware analysis classes and want to learn more. The learning path here will show you the fundamentals of malware analysis…

MMalware Analysis
DLL side loading technique leveraged by Qakbot to carry out its attack
Read More

    How QakBot Leverages DLL Side Loading Technique? – Technical Analysis

    • bySatyajit Daulaguphu
    • November 5, 2022
    QBot is a banking trojan that steals victims’ credentials and is usually spread via phishing campaigns. QBot aka…
    MMalware Analysis
    PE structure
    Read More

      Mastering PE Structure for Malware Analysis: A Layman’s Guide

      • bySatyajit Daulaguphu
      • August 15, 2022
      In this article, we will look at the PE Structure or Portable Executable file format (PE File Format),…
      MMalware Analysis
      Malware Persistence mechanisms
      Read More

        11 Critical Malware Persistence Mechanisms You Should Be Familiar With!

        • bySatyajit Daulaguphu
        • April 7, 2022
        In this article, we’ll take a look at some of the most common malware persistence mechanisms as malware…
        MMalware Analysis
        Understanding Concepts of VA, RVA and File Offsets
        Read More

          Understanding Concepts of Virtual Address (VA), Relative Virtual Address (RVA) and File Offsets

          • bySatyajit Daulaguphu
          • October 24, 2019
          Before we proceed to the concept of PE File Format, which describes the internal structure of all Windows…
          MMalware Analysis
          Import Address Table of an Executable File
          Read More

            Exciting Journey Towards Import Address Table (IAT) of an Executable

            • bySatyajit Daulaguphu
            • August 27, 2019
            Earlier, I wrote a post on Understanding PE Structure – The Layman’s Way and this one is a…

            Subscribe to Our Newsletter

            Get exclusive updates on the latest Malware Research articles – because staying ahead is staying secure.

            Tech Zealots
            © 2023. All Rights Reserved.
            • Privacy Policy
            • Cookies Policy
            • Write for Us