How QakBot Leverages DLL Side Loading Technique? – Technical Analysis

DLL side loading technique leveraged by Qakbot to carry out its attack

QBot is a banking trojan that steals victims’ credentials and is usually spread via phishing campaigns. QBot aka QakBot malware has been there for a decade as it frequently evolves new techniques to attack victims. Recently, several articles have been making rounds regarding the new variant of QakBot leverages DLL Side Loading technique to spread … Read more

Mastering PE Structure for Malware Analysis: A Layman’s Guide

PE structure

In this article, we will look at the PE Structure or Portable Executable file format (PE File Format), which is important in understanding the internal structure of an executable file. Once you have an overall idea about what’s inside the executable file and how it works in Windows, it will become easy to analyze any … Read more

11 Critical Malware Persistence Mechanisms You Should Be Familiar With!

Malware Persistence mechanisms

In this article, we’ll take a look at some of the most common malware persistence mechanisms as malware likes to persist whenever they take control of any compromised system. Windows has a lot of AutoStart Extension Points (ASEP) which makes it easier for the malware to persist so that it can continue doing its work … Read more

So, Emotet’s Back Huh…

So, Emotet’s back after a hiatus of around 5 months and, as per claims around the internet, delivered around 80k spam emails in 24hr on its return. So, let’s see what the Maldoc being delivered this time looks like. We downloaded this particular sample from hxxp://www[.]ahbro[.]com/wp-content/browse/omxl046951300lyxdvye9ksa2j. Let’s begin then. First, let’s see how the latest … Read more

How To Quickly Extract Malicious Macros From Maldoc & Triage Incident?

Macro Enabled Doc

Ever received a Security Incident where a user machine got infected by a malicious attachment? And as an Incident Responder, you suspect having a malicious macro that takes advantage of Windows’ own legitimate tools like CMD and PowerShell. Maybe you are not sure how to quickly extract and analyze macros without going through a lot … Read more