ghettoforensics.com
Ghetto Forensics: February 2014
http://www.ghettoforensics.com/2014_02_01_archive.html
Digital Forensics, Incident Response, Malware Analysis, and Python coding on the cheap. Malware with No Strings Attached Part 2 - Static Analysis. In the previous post. I showed some dynamic analysis procedures for a variant of a trojan. Known to Symantec as Coreflood. Based on the dynamic analysis. However, in the end, we still had many questions that couldnt be answered:. What is the encryption routine used for thr1.chm and mmc109.exe? Why does the malware rename mmc109.exe to mmc61753109.exe? This als...
nothink.org
NoThink!
http://www.nothink.org/honeypots/malware-archives
Binaries samples collect with honeypots are available for download by any responsible whitehat researcher. By downloading the samples, anyone waives all rights to claim punitive, incidental and consequential damages resulting from mishandling or self-infection. If you do not know what you are doing here, it is recommended you leave right away. This page has no commercial purpose. Notes about the collection of binaries. Malware list: (#246 Clamscan engine version 0.98.5) malware list.txt.
brimorlabsblog.com
BriMor Labs: Teslacrypt vs open source tools
http://www.brimorlabsblog.com/2015/03/telsacrypt-vs-open-source-tools.html
Welcome to the BriMor Labs blog. BriMor Labs is located near Baltimore, Maryland. We specialize in offering Digital Forensics, Incident Response, and Training solutions to our clients. Friday, March 20, 2015. Teslacrypt vs open source tools. Today's blog post is going to cover a new "variant" of ransomware that has been deemed "Teslacrypt", which was highlighted in a fairly detailed post by Vadim Kotov from Bromium Labs. If you would like to dig into them on your own! The processes created by Teslacrypt2...
bnxnet.com
July | 2013 | binaryXnetworks
https://www.bnxnet.com/2013/07
Skip to main menu. Monthly Archives: July 2013. Top Maliciously Used APIs. Today I’m going to be discussing the top APIs imported from a large number of confirmed malware samples. This all started out of a curiosity and a lack of research published surrounding the topic. I’m not 100% sure I reached any concrete conclusions after completing this experiment but here are my results and the conclusions I drew. There was a final total of 120,126 uniquely imported APIs. A much larger number than I would ha...
ghettoforensics.com
Ghetto Forensics: Is Google Scanning Malware Email Attachments Between Researchers
http://www.ghettoforensics.com/2014/02/google-actively-scanning-malware-emails.html
Digital Forensics, Incident Response, Malware Analysis, and Python coding on the cheap. Is Google Scanning Malware Email Attachments Between Researchers. This post is based upon experiences I found when sending malware via GMail (Google Mail). I'm documenting them here for others to: disprove, debate, confirm, or to downplay its importance. That was the case on Valentine's Day, 14 Feb 2014. While working on a malware static analysis blog post, to accompany my dynamic analysis blog post. There is a simple...
palms.ee.princeton.edu
Smartphone Security | PALMS - Princeton University
http://palms.ee.princeton.edu/smartphone
PALMS - Princeton University. Dept of Electrical Engineering. Cache Side-Channels and Secure Caches. PALMScloud Cloud Server Benchmarks. SP and Bastion Secure Processor Architectures. Lee, Wei-Han, and Ruby B. Lee, Multi-sensor authentication to improve smartphone security. Conference on Information Systems Security and Privacy. 2015. Malware Resource: Malware database: http:/ malware.lu. Malware database: http:/ virusshare.com. Mobile malware database: http:/ contagioninidump.blogspot.com.
forksec.wordpress.com
Computer Security Resources | fork()
https://forksec.wordpress.com/2012/08/01/computer-security-resources
Research: GPS Device Analysis. Forensics and Information Security. On August 1, 2012. Thanks for checking out this post! It’ll be revamped shortly to include a better forensics section and, perhaps, a little more order! If you think something should go here, just send me a message! In the meantime, feel free to check out some of the great links on the right side menu of the blog. *. Top Sources at Random. SANS Institute’s Forensics Blog. Exploits Database by Offensive Security. One of the easiest linux d...
guymollet.net
Malware – Guy Ngongang
https://guymollet.net/category/malware
Contacts and PGP key. Malware Information Sharing Platform-MISP. May 13, 2016. May 13, 2016. By Guy Ngongang on information security. The Malware Information Sharing Platform is used to store ,share and collaborate on malware across organizations. The Indicators of Compromise (IoC) are used to detect and prevent Cyber attack. The MISP integrates many features :-Efficient Built-in database to store malwares, information on attackers and intelligence. Data are stored and shared in a structured format.
SOCIAL ENGAGEMENT