Dissecting WannaCry Ransomware to It’s Core – Technical Analysis

Malware analysis of a WannaCry ransomware sample

Hi readers! This will probably be my first technical post regarding the deep analysis of any malware sample. If you would have followed my blog, then you must be aware that most of my posts include building concepts related to malware analysis. However, I decided to take a break from that for a while and … Read more

Understanding Concepts of Virtual Address (VA), Relative Virtual Address (RVA) and File Offsets

Understanding Concepts of VA, RVA and File Offsets

Before we proceed to the concept of PE File Format, which describes the internal structure of all Windows executable files, one should also know the concepts of Virtual Address (VA), Relative Virtual Address (RVA) and File Offsets as these would be the foundation in helping you to understand the technical parts of the PE file … Read more

Exciting Journey Towards Import Address Table (IAT) of an Executable

Import Address Table of an Executable File

Earlier, I wrote a post on Understanding PE Structure – The Layman’s Way and this one is a continuation of that post. I highly recommend my readers to go through that post, where I have gone detailed into the PE file format, before jumping onto this article. Since the earlier post was already too long … Read more

Practical Guide To Manual Unpacking a UPX Packed file

UPX Packer Structure

Today, In this post I will be writing about how you can unpack a UPX packed file. Well, there are several posts related to it online but I have noticed everyone is following just the same steps without giving much insights into the background working. Since my blog is dedicated to the absolute beginners, I’ll … Read more